PRIMORIS      Contacts      FAQs      INSTICC Portal
 

Call for Papers

ICISSP is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on. Cloud computing, big data, and other IT advances raise added security and privacy concerns to organizations and individuals, thus creating new research opportunities.

CONFERENCE AREAS

Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

1. DATA AND SOFTWARE SECURITY
2. TRUST
3. PRIVACY AND CONFIDENTIALITY
4. MOBILE SYSTEMS SECURITY
5. BIOMETRIC AUTHENTICATION


AREA 1: DATA AND SOFTWARE SECURITY


  • Security Frameworks, Architectures and Protocols
  • Cryptographic Algorithms
  • Artificial Intelligence and Security
  • Information Hiding and Anonymity
  • Vulnerability Analysis and Countermeasures
  • Data Integrity
  • Database Security
  • Content Protection and Digital Rights Management
  • Data Mining
  • Software Security Assurance
  • Security Architecture and Design Analysis
  • Security Testing
  • Middleware Security
  • Data Fraud and Data Fabrication

AREA 2: TRUST


  • Computational Models of Trust
  • Risk and Reputation Management
  • Phishing
  • Security and Trust in Pervasive Information Systems
  • E-Commerce and Contract Management Tools
  • Trusted Platforms
  • P2P Transactions and Scenarios
  • Common Practice, Legal and Regulatory Issues
  • Trust in Social Networks
  • Identity and Trust Management
  • Intrusion Detection
  • Smartcard Technology
  • Trustworthy Embedded Devices
  • Electronic Payment Fraud

AREA 3: PRIVACY AND CONFIDENTIALITY


  • Privacy-Enhancing Models and Technologies
  • Network Deployment and Management
  • Web Applications and Services
  • Privacy In Cloud and Pervasive Computing
  • Authentication, Privacy and Security Models
  • Privacy Compliance in Organizations
  • Social Media Privacy
  • User Profiling in E-Commerce Systems
  • E-Voting and Privacy
  • Privacy Metrics and Control
  • Malware Detection
  • Electronic Abuse Protection
  • Ethics

AREA 4: MOBILE SYSTEMS SECURITY


  • Location-based Services
  • GPS-based security
  • Mobile Sensing and Sensor Networks
  • Bluetooth and RFID Security
  • Privacy in Wireless Communications
  • Mobile Applications Control
  • Privacy-Preserving Protocols
  • Vehicular Systems and Networks
  • Secure Routing
  • Software Vulnerabilities
  • Access Control
  • Threat Awareness

AREA 5: BIOMETRIC AUTHENTICATION


  • Identification and Access Control
  • Feature Detection, Selection and Extraction
  • Biosignals in Biometrics
  • Physiological Signal Processing
  • Fingerprint, Face or Iris Recognition
  • Hand Geometry
  • Gait Analysis
  • Speaker Recognition and Voice Analysis
  • Behavioral Patterns
  • Keystroke Dynamics
  • Surveillance
  • Privacy Concerns with Biometrics
  • Multimodal Biometrics Systems
  • Knowledge Discovery in Biometric Databases

KEYNOTE SPEAKERS

Steven FurnellUniversity of Plymouth, United Kingdom
Bryan FordYale University, United States
Günther PernulUniversity of Regensburg, Germany
Edgar WeipplSBA Research, Austria


PAPER SUBMISSION

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

Only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

PUBLICATIONS

All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (CPCI/ISI), INSPEC, DBLP, EI (Elsevier Engineering Village Index) and Scopus.

IMPORTANT DATES

Conference Date: 9 - 11 February, 2015

Paper Submission: October 7, 2014 (expired)
Authors Notification:
November 25, 2014 (expired)
Camera Ready and Registration:
December 10, 2014 (expired)

Paper Submission: November 6, 2014 (expired)
Authors Notification:
November 28, 2014 (expired)
Camera Ready and Registration:
December 17, 2014 (expired)

Workshops
Workshop Proposal: September 9, 2014 (expired)

Doctoral Consortium
Paper Submission: November 27, 2014 (expired)
Authors Notification: December 11, 2014 (expired)
Camera Ready and Registration: December 23, 2014 (expired)

Special Sessions
Special Session Proposal: September 19, 2014 (expired)

Tutorials
Tutorial Proposal: November 27, 2014 (expired)

Demos
Demo Proposal: November 27, 2014 (expired)

Panels
Panel Proposal: November 27, 2014 (expired)

SECRETARIAT

ICISSP Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
             2910-595 Setúbal - Portugal
Tel.: +351 265 100 033
Fax: +44 203 014 8813
e-mail: icissp.secretariat@insticc.org
Web: http://www.icissp.org

VENUE

The conference will be held in Angers, France, on the new campus of ESEO, a graduate school of engineering in IT, electronics, networks and telecommunications.
Angers, the main city of the department of Maine et Loire in the Pays de la Loire region is the capital of the historic province of Anjou and is considered one of the most beautiful cities in France with its old streets, museums, gardens, gastronomic restaurants and art festivals.

CONFERENCE CHAIR

Olivier CampMODESTE/ESEO, France

PROGRAM CO-CHAIRS

Edgar WeipplSBA Research, Austria
Christophe BidanSUPELEC, France
Esma AïmeurUniversity of Montreal, Canada

PROGRAM COMMITTEE MEMBERS

Eduard A. Jorswieck, Dresden University of Technology, Germany
Steve A. Schneider, University of Surrey, United Kingdom
Carlisle Adams, University of Ottawa, Canada
Gordon Agnew, University of Waterloo, Canada
Magnus Almgren, Chalmers University of Technology, Sweden
Mario Alvim, Federal University of Minas Gerais (UFMG), Brazil
Morteza Amini, Sharif University of Technology, Iran, Islamic Republic of
Frederik Armknecht, Mannheim University, Germany
Elias Athanasopoulos, VU University, Amsterdam, Greece
Kensuke Baba, Fujitsu Laboratories Ltd., Japan
Joonsang Baek, Khalifa University of Science, Technology and Research, United Arab Emirates
Alessandro Barenghi, Polytecnic University of Milan, Italy
Anis Ben Aissa, Université Tunis el Manar École Nationale d'ingenieurs de Tunis, Tunisia
Simon R. Blackburn, Royal Holloway University of London, United Kingdom
Douglas Blough, Georgia Institute of Technology, United States
Carlo Blundo, Università di Salerno, Italy
Alessio Botta, University of Napoli Federico II, Italy
Hervé Chabanne, Morpho & Télécom ParisTech, France
Serge Chaumette, Université de Bordeaux, France
Feng Cheng, Hasso-Plattner-Institute at University of Potsdam, Germany
Hung-Yu Chien, National Chi Nan University, Taiwan
Stelvio Cimato, Università degli studi di Milano - Crema, Italy
Bernard Colbert, Deakin University, Australia
Miguel Correia, Universidade do Porto, Faculdade de Engenharia, Portugal
Mathieu Cunche, INSA-Lyon / Inria, France
Christian Damsgaard Jensen, Technical University of Denmark, Denmark
Mohammad Dastbaz, University of Suffolk, United Kingdom
Robert H. Deng, SMU, Singapore
Mingcong Deng, Tokyo University of Agriculture and Technology, Japan
Josée Desharnais, Université Laval, Canada
Andreas Dewald, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Xuhua Ding, SMU, Singapore
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Changyu Dong, University of Strathclyde, United Kingdom
Naranker Dulay, Imperial College London, United Kingdom
Isao Echizen, National Institute of Informatics, Japan
Alekander Essex, Western University, Canada
Benjamin Fung, McGill University, Canada
Alban Gabillon, Laboratoire GePaSud - Université de la Polynésie Française, French Polynesia
Clemente Galdi, Universita' di Napoli “Federico II”, Italy
Debin Gao, Singapore Management University, Singapore
Ferrari Gianlugi, Univ. Pisa, Italy
Bok-Min Goi, Universiti Tunku Abdul Rahman, Malaysia
Dieter Gollmann, TU Hamburg, Germany
Ana I. González-Tablas, University Carlos III of Madrid, Spain
Gilles Guette, University of Rennes, France
Catherine H. Gebotys, University of Waterloo, Canada
Ragib Hasan, University of Alabama at Birmingham, United States
Kirstie Hawkey, Dalhousie University, Canada
Maritta Heisel, Universität Duisburg-Essen, Germany
Fu-Hau Hsu, National Central University, Taiwan
Sorin A. Huss, Center for Advanced Security Research Darmstadt, Germany
Dieter Hutter, German Research Centre for Artificial Intelligence, Germany
Tzonelih Hwang, National Cheng Kung University, Taiwan
Shambhu J. Upadhyaya, University at Buffalo, United States
Mariusz Jakubowski, Microsoft Research, United States
Rasool Jalili, Sharif university of technology, Iran, Islamic Republic of
Thomas Jensen, University of Copenhagen, Denmark
Rafael Timoteo de Sousa Junior, University of Brasilia, Brazil
Ghassan Karame, NEC Laboratories, Germany
Hiroaki Kikuchi, Meiji University, Japan
Kwangjo Kim, KAIST, Korea, Republic of
Dong Seong Kim, University of Canterbury, New Zealand
Jiejun Kong, University of California Los Angeles, United States
Elisavet Konstantinou, University of the Aegean, Greece
Hristo Koshutanski, Safe Society Labs, Spain
Sanjeev Kumar, University of Texas - RGV, United States
Nadira Lammari, Conservatoire National des Arts et Métiers, France
Gabriele Lenzini, University of Luxembourg, Luxembourg
Ming Li, East China Normal University, China
Zhiqiang Lin, University of Texas at Dallas, United States
Flamina Luccio, Università Ca' Foscari Venezia, Italy
Rakesh M. Verma, University of Houston, United States
Federico Maggi, Politecnico di Milano, Italy
Ilaria Matteucci, Istituto di Informatica e Telematica, CNR, Italy
Catherine Meadows, US Naval Research Laboratory, United States
Florian Mendel, TU Graz, Austria
Nele Mentens, Katholieke Universiteit Leuven, Belgium
Joseph Migga Kizza, University of Tennessee-Chattanooga, United States
Ali Miri, Ryerson University, Canada
Mattia Monga, Università degli Studi di Milano, Italy
Paolo Mori, Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy
Charles Morisset, Newcastle University, United Kingdom
Kirill Morozov, Tokyo Institute of Technology, Japan
Paliath Narendran, State University of New York at Albany, United States
Mehrdad Nojoumian, Florida Atlantic University, United States
Gabriele Oligeri, Università di Roma Tre, Italy
Donal O'Mahony, Trinity College Dublin, Ireland
Carles Padro, Universitat Politecnica de Catalunya, Spain
Andreas Peter, University of Twente, Netherlands
Makan Pourzandi, Ericsson Research, Canada
Vassilis Prevelakis, Technische Universität Braunschweig, Germany
Robert Proctor, Purdue University, United States
Nabil R. Adam, Rutgers University, United States
Kenneth Radke, Information Security Institute, Queensland University of Technology, Australia
Wolfgang Reif, University of Augsburg, Germany
Eike Ritter, University of Birmingham, United Kingdom
Jean-Marc Robert, ETS Montreal, Canada
Neil Rowe, Naval Postgraduate School, United States
Giovanni Russello, University of Auckland, New Zealand
Hossein Saiedian, University of Kansas, United States
Michael Scott, Certivox Ltd, Ireland
Kent Seamons, Brigham Young University, United States
Roberto Segala, Università di Verona, Italy
Abdulhadi Shoufan, Khalifa University of Science, United Arab Emirates
Alexander Shvartsman, University of Connecticut, United States
Alexander Sideridis, Agricultural University of Athens, Greece
Nicolas Sklavos, University of Patras, Greece
Rainer Steinwandt, Florida Atlantic University, United States
Hung-Min Sun, National Tsing Hua University, Taiwan
Shamik Sural, IIT Kharagpur, India
Tsuyoshi Takagi, Kyushu University, Japan
Nadia Tawbi, Université Laval, Canada
Cihangir Tezcan, Middle East Technical University, Turkey
Raylin Tso, National Chengchi University, Taiwan
Yasuyuki Tsukada, Kanto Gakuin University, Japan
Udaya Tupakula, Macquarie University, Australia
Catalin V. Birjoveanu, Al.I.Cuza University of Iasi, Romania
Adriano Valenzano, Consiglio Nazionale delle Ricerche, Italy
Craig Valli, Edith Cowan University, Australia
Hongjun Wu, Nanyang Technological University, Singapore
Ching-Nung Yang, National Dong Hwa University, Taiwan
Neil Y. Yen, University of Aizu, Japan
Amr Youssef, Concordia University, Canada
Moti Yung, Google Inc. and Columbia University, United States
Jianhong Zhang, North China University of Technology, China
Jie Zhang, Nanyang Technological University, Singapore
Wenbing Zhao, Cleveland State University, United States
Huafei Zhu, Institute for Infocomm Research (I2R), A-Star, Singapore

footer