Difference between revisions of "ICISS 2008"

From Openresearch
Jump to: navigation, search
(Event created)
 
(XwXVuVHSzsYpKZLTdMt)
 
(6 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{Event
+
This is very interesting, You're a very proofssienal blogger. I have joined your rss feed and sit up for looking for more of your wonderful post. Additionally, I have shared your web site in my social networks!
| Acronym = ICISS 2008
 
| Title = 4th International Conference on Information Systems Security
 
| Type = Conference
 
| Series =
 
| Field = Computer security and reliability
 
| Homepage = www.seclab.cs.sunysb.edu/iciss08
 
| Start date = Dec 16, 2008
 
| End date =  Dec 20, 2008
 
| City= Hyderabad
 
| State =  Andhra Pradesh
 
| Country =  india
 
| Abstract deadline =
 
| Submission deadline = Jul 19, 2008
 
| Notification = Sep 8, 2008
 
| Camera ready =
 
}}
 
 
 
<pre>
 
----------------------------------------------------------------------------
 
4th International Conference on Information Systems Security (ICISS 2008)
 
16-20 December 2008, Hyderabad, India
 
 
 
http://www.seclab.cs.sunysb.edu/iciss08/
 
----------------------------------------------------------------------------
 
 
 
The conference series ICISS (International Conference on Information
 
Systems Security), held annually, provides a forum for disseminating
 
the latest research results in information and systems security. The
 
acceptance ratio of the first three conferences has averaged less than
 
30%, and the proceedings have been published as part of the Springer
 
Verlag series of Lecture Notes in Computer Science. The ICISS 2008
 
encourages submissions from academia, industry and government
 
addressing theoretical and practical problems in information and
 
systems security and related areas. Topics of interest include but are
 
not limited to:
 
 
 
Application Security                                    Authentication and Access Control
 
Biometric Security                                      Data Security
 
Digital Forensics and Diagnostics                      Digital Rights Management
 
Distributed System Security                            Formal Methods in Security
 
Intrusion Detection, Prevention and Response            Intrusion Tolerance and Recovery
 
Key Management and Cryptographic Protocols              Language-based Security
 
Malware Analysis and Mitigation                        Network Security
 
Operating System Security                              Privacy and Anonymity
 
Security in P2P, Sensor and Ad Hoc Networks            Software Security
 
Vulnerability Detection and Mitigation                  Web Security
 
 
 
PROGRAM COMMITTEE:
 
Vijay Atluri, Rutgers University                        Arun K. Majumdar, Indian Institute of Technology, Kharagpur
 
Aditya Bagchi, Indian Statistical Institute, Kolkata    Anish Mathuria, DA-IICT, Gandhinagar
 
Kevin Butler, Penn State University                    Chandan Mazumdar, Jadhavpur University, Kolkata
 
Chakravarthy Bhagvati, University of Hyderabad          Nasir Memon, Polytechnic University
 
Lorenzo Cavallaro, University of Milan/UCSB            Peng Ning, North Carolina State University
 
Hao Chen, University of California, Davis              Atul Prakash, University of Michigan
 
Shuo Chen, Microsoft Research, Redmond                  R. Ramanujam, Institute of Mathematical Sciences, Chennai
 
Marc Dacier, Symantec Research Labs                    Sanjay Rawat, Infosys Technologies Ltd.
 
Saumya Debray, University of Arizona                    Pierangela Samarati, University of Milan
 
Subrat Kumar Dash, University of Hyderabad              Amitabh Saxena, University of Trento
 
Vinod Ganapathy, Rutgers University                    Radu Sion, Stony Brook University
 
Jonathon Giffin, Georgia Institute of Technology        Anil Somayaji, Carleton University
 
S K Gupta, Indian Institute of Technology, Delhi        Robin Sommer, ICSI/LBNL
 
Sushil Jajodia, George Mason University                Gaurav Tandon, Florida Institute of Technology
 
Somesh Jha, University of Wisconsin, Madison            Vijay Varadharajan, Macquarie University
 
Shrikant Ojha, DRDO, Government of India                V.N. Venkatakrishnan, University of Illinois, Chicago
 
Engin Kirda, Technical University of Vienna            Poorvi Vora, George Washington University
 
P. Radha Krishna, Infosys Technologies Ltd.            Xiaofeng Wang, Indiana University
 
G. Vijaya Kumari, JNTU, Hyderabad                      Wei Xu, VMware Inc.
 
Zhenkai Liang, Carnegie Mellon University
 
 
 
ORGANIZING COMMITTEE:
 
Advisory Committee Chair:  Sushil Jajodia, George Mason University
 
Program Co-chairs:        Arun K Pujari, LNM IIT
 
  R. Sekar, Stony Brook University
 
Submissions/Website Chair: Subrat Kumar Dash, University of Hyderabad
 
Publicity Chair:          Alok Tongoankar, Stony Brook University
 
Tutorial Co-chairs:        Vineet P Nair, University of Hyderabad
 
  V.N. Venkatakrishnan, University of Illinois at Chicago
 
Organizing Chair:          G. Vijaya Kumari, JNTU, Hyderabad
 
Finance Chair:            P. Radha Krishnan, Infosys, Hyderabad
 
 
 
---------------------------------------------------
 
IMPORTANT DATES
 
Manuscript Submission          19 July 2008
 
Tutorial Proposal Submission    26 July 2008
 
Notification of Acceptance      08 Sep 2008
 
Camera-Ready Manuscript        22 Sep 2008
 
---------------------------------------------------
 
 
 
SUBMISSION INSTRUCTIONS:
 
 
 
PAPERS:
 
Papers should be formatted as they would appear in the final LNCS
 
proceedings. Papers should be at most 15 pages in length, including
 
the bibliography. Detailed submission instructions can be found at
 
the conference web site. One of the authors of an accepted paper must
 
attend the conference to present the paper. ICISS accepts only
 
electronic submissions in PDF format. Camera-ready manuscripts must be
 
submitted in LaTex.
 
 
 
Submitted papers must not substantially overlap with papers published
 
or currently submitted to a journal or a conference with proceedings.
 
 
 
ONGOING RESEARCH REPORTS:
 
There will be two sessions to present reports on the current research
 
projects. One session will be for academic institutions and the other
 
for industrial establishments. The research reports should be
 
submitted in the same way as the technical papers. A report should be
 
maximum of 4 pages.
 
 
 
TUTORIAL PROPOSALS:
 
There will be tutorial program for two days (16-17 December 2008). At
 
most four three-hour tutorials will be offered.  Proposals are invited
 
for tutorials of duration three hours on relevant topics of current
 
interest. A tutorial proposal should include the extended abstract of
 
the tutorial and a brief biography of the speaker(s). Please mail your
 
proposal to the Tutorial Chair. The speaker(s) of the accepted
 
proposals need to submit their final presentation one month before the
 
conference to the Tutorial Chair.
 
</pre>This CfP was obtained from [http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=3121&amp;copyownerid=2 WikiCFP]
 

Latest revision as of 04:51, 29 May 2012

This is very interesting, You're a very proofssienal blogger. I have joined your rss feed and sit up for looking for more of your wonderful post. Additionally, I have shared your web site in my social networks!