Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Call for Papers

ICISSP is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on. Cloud computing, big data, and other IT advances raise added security and privacy concerns to organizations and individuals, thus creating new research opportunities.

CONFERENCE AREAS

Avaliable soon.

KEYNOTE SPEAKERS

Steven FurnellUniversity of Plymouth, United Kingdom
Bryan FordYale University, United States
Günther PernulUniversity of Regensburg, Germany
Edgar WeipplUniversity of Vienna, SBA Research, Austria


PAPER SUBMISSION

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

Only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

PUBLICATIONS

All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on digital support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book.
The proceedings will be submitted for indexation by .

IMPORTANT DATES

Conference Date: 9 - 11 February, 2015

Paper Submission: October 7, 2014 (expired)
Authors Notification:
November 25, 2014 (expired)
Camera Ready and Registration:
December 10, 2014 (expired)

Paper Submission: November 6, 2014 (expired)
Authors Notification:
November 28, 2014 (expired)
Camera Ready and Registration:
December 17, 2014 (expired)

Workshops
Workshop Proposal: September 9, 2014 (expired)

Doctoral Consortium
Paper Submission: November 27, 2014 (expired)
Authors Notification: December 11, 2014 (expired)
Camera Ready and Registration: December 23, 2014 (expired)

Special Sessions
Special Session Proposal: September 19, 2014 (expired)

Tutorials
Tutorial Proposal: November 27, 2014 (expired)

Demos
Demo Proposal: November 27, 2014 (expired)

Panels
Panel Proposal: November 27, 2014 (expired)

SECRETARIAT

ICISSP Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
             2910-595 Setúbal - Portugal
Tel.: +351 265 100 033
Fax: +44 203 014 8813
e-mail: icissp.secretariat@insticc.org
Web: https://icissp.scitevents.org

VENUE

The conference will be held in Angers, France, on the campus of ESEO, a graduate school of engineering in IT, electronics, networks and telecommunications.
Angers, the main city of the department of Maine et Loire in the Pays de la Loire region is the capital of the historic province of Anjou and is considered one of the most beautiful cities in France with its old streets, museums, gardens, gastronomic restaurants and art festivals.

CONFERENCE CHAIR

Olivier CampComputer Science, Graduate School of Electronics of the West, France

PROGRAM CO-CHAIRS

Edgar WeipplUniversity of Vienna, SBA Research, Austria
Christophe Bidan, France
Esma AïmeurDepartment Of Computer Science And Operations Research (diro), University of Montreal, Canada

PROGRAM COMMITTEE MEMBERS

Nabil R. Adam, Rutgers CIMIC Research Center, Rutgers University, United States
Carlisle Adams, School of Electrical Engineering and Computer Science, University of Ottawa, Canada
Gordon Agnew, University of Waterloo, Canada
Magnus Almgren, Department of Computer Science and Engineering, Chalmers University of Technology, Sweden
Mario Alvim, Computer Science Department, Federal University of Minas Gerais (UFMG), Brazil
Morteza Amini, Computer Engineering, Sharif University of Technology, Iran, Islamic Republic of
Frederik Armknecht, Independent Researcher, Germany
Elias Athanasopoulos, Computer Science, University of Cyprus, Cyprus
Kensuke Baba, Fujitsu Laboratories Ltd., Japan
Joonsang Baek, Khalifa University of Science, Technology and Research, United Arab Emirates
Alessandro Barenghi, Department of Electronics, Information and Bioengineering , Polytecnic University of Milan, Italy
Anis Ben Aissa, Computer science, Université Tunis el Manar École Nationale d'ingenieurs de Tunis, Tunisia
Simon R. Blackburn, Mathematics, Royal Holloway University of London, United Kingdom
Douglas Blough, Georgia Institute of Technology, United States
Carlo Blundo, Dipartimento di Scienze Aziendali - Management e Innovation Systems, Università di Salerno, Italy
Alessio Botta, University of Napoli Federico II, Italy
Hervé Chabanne, Idemia & Télécom Paris, France
Serge Chaumette, LaBRI (Boirdeaux Computer Science Research Laboratory), Université de Bordeaux, France
Feng Cheng, Hasso-Plattner-Institute at University of Potsdam, Germany
Hung-Yu Chien, information management, National Chi Nan University, Taiwan, Republic of China
Stelvio Cimato, Department of Computer Science, Università degli Studi di Milano, Italy
Bernard Colbert, Deakin University, Australia
Miguel Correia, Electrical and Computer Engineering, Universidade do Porto, Faculdade de Engenharia, Portugal
Mathieu Cunche, CITI / Privatics, INSA-Lyon / Inria, France
Mohammad Dastbaz, VC Group, University of Suffolk, United Kingdom
Robert H. Deng, Independent Researcher, Singapore
Mingcong Deng, Dept. of Electrical and Electronic Eng., Tokyo University of Agriculture and Technology, Japan
Josée Desharnais, Université Laval, Canada
Andreas Dewald, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Xuhua Ding, Independent Researcher, Singapore
Josep Domingo-Ferrer, Department of Computer Engineering and Maths, Rovira i Virgili University, Spain
Changyu Dong, Computer and Information Sciences, University of Strathclyde, United Kingdom
Naranker Dulay, Imperial College London, United Kingdom
Isao Echizen, National Institute of Informatics, Japan
Alekander Essex, Department of Electrical and Computer Engineering, Western University, Canada
Benjamin C. M. Fung, 3661 Peel Street, School of Information Studies, McGill University, Montreal, Canada
Alban Gabillon, Laboratoire GePaSud - Université de la Polynésie Française, French Polynesia
Clemente Galdi, Università di Salerno, Italy
Debin Gao, Singapore Management University, Singapore
Catherine H. Gebotys, Electrical and Computer Engineering, University of Waterloo, Canada
Ferrari Gianlugi, Independent Researcher, Italy
Bok-Min Goi, Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Malaysia
Dieter Gollmann, TU Hamburg, Germany
Ana I. González-Tablas, University Carlos III of Madrid, Spain
Gilles Guette, University of Rennes, France
Ragib Hasan, Computer and Information Sciences, University of Alabama at Birmingham, United States
Kirstie Hawkey, Faculty of Computer Science, Dalhousie University, Canada
Maritta Heisel, Universität Duisburg-Essen, Germany
Fu-Hau Hsu, Computer Science and Information Engineering, National Central University, Taiwan, Republic of China
Sorin A. Huss, Computer Science, Technische Universität Darmstadt, Center for Advanced Security Research Darmstadt, Germany
Dieter Hutter, German Research Centre for Artificial Intelligence, Germany
Tzonelih Hwang, National Cheng Kung University, Taiwan, Republic of China
Mariusz Jakubowski, Microsoft Research alum, United States
Rasool Jalili, Computer Engineering, Sharif University of Technology, Iran, Islamic Republic of
Thomas Jensen, University of Copenhagen, Denmark
Christian D. Jensen, Department of Applied Mathematics and Computer Science, Technical University of Denmark, Denmark
Eduard A. Jorswieck, Dresden University of Technology, Germany
Ghassan Karame, NEC Laboratories, Germany
Hiroaki Kikuchi, School of Interdisciplinary Mathematical Sciences, Meiji University, Japan
Kwangjo Kim, Independent Researcher, Korea, Republic of
Dong S. Kim, University of Canterbury, New Zealand
Joseph M. Kizza, Computer Science and Engineering, University of Tennessee-Chattanooga, United States
Jiejun Kong, University of California Los Angeles, United States
Elisavet Konstantinou, University of the Aegean, Greece
Hristo Koshutanski, Research and Innovation, Atos, Spain
Sanjeev Kumar, Electrical and Computer Engineering, University of Texas - RGV, United States
Nadira Lammari, Conservatoire National des Arts et Métiers, France
Gabriele Lenzini, Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg
Ming Li, Institute of System Sciences, East China Normal University, China
Zhiqiang Lin, University of Texas at Dallas, United States
Flamina Luccio, DAIS, Università Ca' Foscari Venezia, Italy
Federico Maggi, DEIB, Politecnico di Milano, Italy
Ilaria Matteucci, Istituto di Informatica e Telematica, CNR, Italy
Catherine Meadows, Code 5543, US Naval Research Laboratory, United States
Florian Mendel, IAIK, TU Graz, Austria
Nele Mentens, Katholieke Universiteit Leuven, Belgium
Ali Miri, Computer Science, Toronto Metropolitan University, Canada
Mattia Monga, Computer Science, Università degli Studi di Milano, Italy
Paolo Mori, Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy
Charles Morisset, Newcastle University, United Kingdom
Kirill Morozov, Department of Computer Science and Engineering, University of North Texas, United States
Paliath Narendran, Computer Science, State University of New York at Albany, United States
Mehrdad Nojoumian, Computer & Electrical Engineering and Computer Science , Florida Atlantic University, United States
Gabriele Oligeri, , Italy
Donal O'Mahony, Trinity College Dublin, Ireland
Carles Padro, Applied Mathematics 4, Universitat Politecnica de Catalunya, Spain
Andreas Peter, Services, Cybersecurity, and Safety, University of Twente, Netherlands
Makan Pourzandi, Independent Researcher, Canada
Vassilis Prevelakis, Technische Universität Braunschweig, Germany
Robert Proctor, Psychological Sciences, Purdue University, United States
Kenneth Radke, Information Security Institute, Queensland University of Technology, Australia
Wolfgang Reif, Institute for Software & Systems Engineering, University of Augsburg, Germany
Eike Ritter, University of Birmingham, United Kingdom
Jean-Marc Robert, Génie logiciel et des TIs, School of Higher Technology - University of Quebec, Canada
Neil Rowe, Computer Science, Naval Postgraduate School, United States
Giovanni Russello, Computer Science , University of Auckland, New Zealand
Hossein Saiedian, EECS, University of Kansas, United States
Steve A. Schneider, University of Surrey, United Kingdom
Michael Scott, Certivox Labs, Certivox Ltd, Ireland
Kent Seamons, Computer Science Department, Brigham Young University, United States
Roberto Segala, Computer Science, Università di Verona, Italy
Abdulhadi Shoufan, Khalifa University of Science, United Arab Emirates
Alexander Shvartsman, Computer Science & Engineering, University of Connecticut, United States
Alexander Sideridis, Economics, Agricultural University of Athens, Greece
Nicolas Sklavos, Computer Engineering & Informatics Department, University of Patras, Greece
Rainer Steinwandt, Mathematical Sciences, Florida Atlantic University, United States
Hung-Min Sun, Department of Computer Science, National Tsing Hua University, Taiwan, Republic of China
Shamik Sural, , India
Tsuyoshi Takagi, Kyushu University, Japan
Nadia Tawbi, Informatique et génie logiciel, Université Laval, Canada
Cihangir Tezcan, Cyber Security, Middle East Technical University, Turkey
Rafael T. Timoteo Timóteo de Sousa Jr, Electrical Engineering Department, National Science and Technology Institute on Cyber Security, Electrical Engineering Department, University of Brasília (UnB), P.O. Box 4466, Brasília–DF, CEP 70910-900, Brazil
Raylin Tso, Computer Science, National Chengchi University, Taiwan, Republic of China
Yasuyuki Tsukada, Kanto Gakuin University, Japan
Udaya Tupakula, University of Newcastle, Australia
Shambhu J. Upadhyaya, Computer Science and Engineering, University at Buffalo, United States
Catalin V. Birjoveanu, Department of Computer Science, Al.I.Cuza University of Iasi, Romania
Adriano Valenzano, CNR-IEIIT, Consiglio Nazionale delle Ricerche, Italy
Craig Valli, Security Research Institute, Edith Cowan University, Australia
Rakesh M. Verma, 4800 Calhoun Road, 501 PGH, University of Houston, United States
Hongjun Wu, Nanyang Technological University, Singapore
Ching-Nung Yang, Computer Science and Information Engineering, National Dong Hwa University, Taiwan, Republic of China
Neil Y. Yen, School of Computer Science and Engineering, University of Aizu, Japan
Amr Youssef, Concordia University, Canada
Moti Yung, Computer Science Dep.,, United States
Jie Zhang, School of Computer Engineering, Nanyang Technological University, Singapore
Jianhong Zhang, North China University of Technology, China
Wenbing Zhao, Electrical and Computer Engineering, Cleveland State University, United States
Huafei Zhu, Institute for Infocomm Research (I2R), A-Star, Singapore

footer