Difference between revisions of "ICISS 2008"

From Openresearch
Jump to: navigation, search
(XwXVuVHSzsYpKZLTdMt)
 
(5 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{Event
+
This is very interesting, You're a very proofssienal blogger. I have joined your rss feed and sit up for looking for more of your wonderful post. Additionally, I have shared your web site in my social networks!
| Acronym = ICISS 2008
 
| Title = 4th International Conference on Information Systems Security
 
| Type = Conference
 
| Series =
 
| Field = Computer security and reliability
 
| Homepage = www.seclab.cs.sunysb.edu/iciss08
 
| Start date = Dec 16, 2008
 
| End date =  Dec 20, 2008
 
| City= Hyderabad
 
| State =  Andhra Pradesh
 
| Country =  india
 
| Abstract deadline =
 
| Submission deadline = Jul 19, 2008
 
| Notification = Sep 8, 2008
 
| Camera ready =
 
}}
 
 
 
4th International Conference on Information Systems Security (ICISS 2008)
 
16-20 December 2008, Hyderabad, India
 
 
 
The conference series ICISS (International Conference on Information
 
Systems Security), held annually, provides a forum for disseminating
 
the latest research results in information and systems security. The
 
acceptance ratio of the first three conferences has averaged less than
 
30%, and the proceedings have been published as part of the Springer
 
Verlag series of Lecture Notes in Computer Science. The ICISS 2008
 
encourages submissions from academia, industry and government
 
addressing theoretical and practical problems in information and
 
systems security and related areas. Topics of interest include but are
 
not limited to:
 
 
 
* Application Security
 
* Authentication and Access Control
 
* Biometric Security
 
* Data Security
 
* Digital Forensics and Diagnostics
 
* Digital Rights Management
 
* Distributed System Security
 
* Formal Methods in Security
 
* Intrusion Detection, Prevention and Response
 
* Intrusion Tolerance and Recovery
 
* Key Management and Cryptographic Protocols
 
* Language-based Security
 
* Malware Analysis and Mitigation
 
* Network Security
 
* Operating System Security
 
* Privacy and Anonymity
 
* Security in P2P, Sensor and Ad Hoc Networks
 
* Software Security
 
* Vulnerability Detection and Mitigation
 
* Web Security
 
 
 
==Program Committee==
 
 
 
* [[has PC member::Vijay Atluri]], Rutgers University
 
* [[has PC member::Arun K. Majumdar]], Indian Institute of Technology, Kharagpur
 
* [[has PC member::Aditya Bagchi]], Indian Statistical Institute, Kolkata
 
* [[has PC member::Anish Mathuria]], DA-IICT, Gandhinagar
 
* [[has PC member::Kevin Butler]], Penn State University
 
* [[has PC member::Chandan Mazumdar]], Jadhavpur University, Kolkata
 
* [[has PC member::Chakravarthy Bhagvati]], University of Hyderabad
 
* [[has PC member::Nasir Memon]], Polytechnic University
 
* [[has PC member::Lorenzo Cavallaro]], University of Milan/UCSB
 
* [[has PC member::Peng Ning]], North Carolina State University
 
* [[has PC member::Hao Chen]], University of California, Davis
 
* [[has PC member::Atul Prakash]], University of Michigan
 
* [[has PC member::Shuo Chen]], Microsoft Research, Redmond
 
* [[has PC member::R. Ramanujam]], Institute of Mathematical Sciences, Chennai
 
* [[has PC member::Marc Dacier]], Symantec Research Labs
 
* [[has PC member::Sanjay Rawat]], Infosys Technologies Ltd.
 
* [[has PC member::Saumya Debray]], University of Arizona
 
* [[has PC member::Pierangela Samarati]], University of Milan
 
* [[has PC member::Subrat Kumar Dash]], University of Hyderabad
 
* [[has PC member::Amitabh Saxena]], University of Trento
 
* [[has PC member::Vinod Ganapathy]], Rutgers University
 
* [[has PC member::Radu Sion]], Stony Brook University
 
* [[has PC member::Jonathon Giffin]], Georgia Institute of Technology
 
* [[has PC member::Anil Somayaji]], Carleton University
 
* [[has PC member::S K Gupta]], Indian Institute of Technology, Delhi
 
* [[has PC member::Robin Sommer]], ICSI/LBNL
 
* [[has PC member::Sushil Jajodia]], George Mason University
 
* [[has PC member::Gaurav Tandon]], Florida Institute of Technology
 
* [[has PC member::Somesh Jha]], University of Wisconsin, Madison
 
* [[has PC member::Vijay Varadharajan]], Macquarie University
 
* [[has PC member::Shrikant Ojha]], DRDO, Government of India
 
* [[has PC member::V.N. Venkatakrishnan]], University of Illinois, Chicago
 
* [[has PC member::Engin Kirda]], Technical University of Vienna
 
* [[has PC member::Poorvi Vora]], George Washington University
 
* [[has PC member::P. Radha Krishna]], Infosys Technologies Ltd.
 
* [[has PC member::Xiaofeng Wang]], Indiana University
 
* [[has PC member::G. Vijaya Kumari]], JNTU, Hyderabad
 
* [[has PC member::Wei Xu]], VMware Inc.
 
* [[has PC member::Zhenkai Liang]], Carnegie Mellon University
 
 
 
==ORGANIZING COMMITTEE==
 
* Advisory Committee Chair:  [[has OC member::Sushil Jajodia]], George Mason University
 
* Program Co-chairs:
 
** [[has OC member::Arun K Pujari]], LNM IIT
 
** [[has OC member::R. Sekar]], Stony Brook University
 
* Submissions/Website Chair: [[has OC member::Subrat Kumar Dash]], University of Hyderabad
 
* Publicity Chair:          [[has OC member::Alok Tongoankar]], Stony Brook University
 
* Tutorial Co-chairs:
 
** [[has OC member::Vineet P Nair]], University of Hyderabad
 
** [[has OC member::V.N. Venkatakrishnan]], University of Illinois at Chicago
 
* Organizing Chair:          [[has OC member::G. Vijaya Kumari]], JNTU, Hyderabad
 
* Finance Chair:            [[has OC member::P. Radha Krishnan]], Infosys, Hyderabad
 
 
 
 
 
==IMPORTANT DATES==
 
Manuscript Submission          19 July 2008
 
Tutorial Proposal Submission    26 July 2008
 
Notification of Acceptance      08 Sep 2008
 
Camera-Ready Manuscript        22 Sep 2008
 
 
 
 
 
==SUBMISSION INSTRUCTIONS==
 
 
 
===PAPERS===
 
Papers should be formatted as they would appear in the final LNCS
 
proceedings. Papers should be at most 15 pages in length, including
 
the bibliography. Detailed submission instructions can be found at
 
the conference web site. One of the authors of an accepted paper must
 
attend the conference to present the paper. ICISS accepts only
 
electronic submissions in PDF format. Camera-ready manuscripts must be
 
submitted in LaTex.
 
 
 
Submitted papers must not substantially overlap with papers published
 
or currently submitted to a journal or a conference with proceedings.
 
 
 
===ONGOING RESEARCH REPORTS===
 
There will be two sessions to present reports on the current research
 
projects. One session will be for academic institutions and the other
 
for industrial establishments. The research reports should be
 
submitted in the same way as the technical papers. A report should be
 
maximum of 4 pages.
 
 
 
===TUTORIAL PROPOSALS===
 
There will be tutorial program for two days (16-17 December 2008). At
 
most four three-hour tutorials will be offered.  Proposals are invited
 
for tutorials of duration three hours on relevant topics of current
 
interest. A tutorial proposal should include the extended abstract of
 
the tutorial and a brief biography of the speaker(s). Please mail your
 
proposal to the Tutorial Chair. The speaker(s) of the accepted
 
proposals need to submit their final presentation one month before the
 
conference to the Tutorial Chair.
 

Latest revision as of 04:51, 29 May 2012

This is very interesting, You're a very proofssienal blogger. I have joined your rss feed and sit up for looking for more of your wonderful post. Additionally, I have shared your web site in my social networks!