Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Call for Papers

ICISSP is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, that concerns to organizations and individuals, thus creating new research opportunities.

CONFERENCE TOPICS


  • Access and Usage Control
  • Authentication, Privacy and Security Models
  • Automotive Security
  • Biometric Technologies and Applications
  • Content Protection and Digital Rights Management
  • Cryptographic Algorithms
  • Data and Software Security
  • Data Mining and Knowledge Discovery
  • Database Security
  • Identity and Trust Management
  • Information Hiding and Anonymity
  • Intrusion Detection and Response
  • Legal and Regulatory Issues
  • Malware Detection
  • Mobile Systems Security
  • Phishing
  • Privacy Metrics and Control
  • Privacy, Security and Trust in Social Media
  • Privacy-Enhancing Models and Technologies
  • Risk and Reputation Management
  • Security and Privacy in Cloud and Pervasive Computing
  • Security and Trust in Pervasive Information Systems
  • Security Architecture and Design Analysis
  • Security Awareness and Education
  • Security Frameworks, Architectures and Protocols
  • Security Testing
  • Software Security Assurance
  • Threat Awareness
  • Vulnerability Analysis and Countermeasures
  • Web Applications and Services

KEYNOTE SPEAKERS

Elisa BertinoDepartment of Computer Science, Purdue University, United States
Nancy Cam-WingetSecurity Business Group, Cisco Systems, United States
Bart PreneelESAT/COSIC, KU Leuven, Belgium

PAPER SUBMISSION

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

Only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

PUBLICATIONS

All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on digital support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book.
A short list of papers presented at the conference venue will be selected for publication of extended and revised versions in a special issue of Computers & Security Journal.
The proceedings will be submitted for indexation by .

IMPORTANT DATES

Conference Date: 19 - 21 February, 2017

Paper Submission: October 27, 2016 (expired)
Authors Notification:
December 2, 2016 (expired)
Camera Ready and Registration:
December 16, 2016 (expired)

Paper Submission: November 28, 2016 (expired)
Authors Notification:
December 20, 2016 (expired)
Camera Ready and Registration:
January 5, 2017 (expired)

Workshops
Workshop Proposal: November 10, 2016 (expired)
Paper Submission: December 10, 2016 (expired)
Authors Notification: December 23, 2016 (expired)
Camera Ready and Registration: January 5, 2017 (expired)

Special Sessions
Special Session Proposal: November 28, 2016 (expired)

Tutorials
Tutorial Proposal: January 3, 2017 (expired)

Demos
Demo Proposal: January 3, 2017 (expired)

Panels
Panel Proposal: January 3, 2017 (expired)

SECRETARIAT

ICISSP Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
             2910-595 Setúbal - Portugal
Tel.: +351 265 520 185
Fax: +351 265 520 186
e-mail: icissp.secretariat@insticc.org
Web: https://icissp.scitevents.org

VENUE

Overlooking the Douro River, Porto is one of the most ancient European cities, It was born and developed from the northern bank of this river during the Middle Ages. One of the most significant aspects of Porto and its historical centre is its landscape, combining harmony with the urban structure and presenting a frame of rare beauty. The city was classified as World Heritage by UNESCO in 1996. When discovering Porto, you will find many surprises. Besides its welcoming and conservative environment, Porto is also contemporary and artistic. This is shown not only in the streets, architecture, monuments and museums but also in the terraces, restaurants and leisure and shopping areas.

CONFERENCE CHAIR

Olivier CampComputer Science, Graduate School of Electronics of the West, France

PROGRAM CO-CHAIRS

Paolo MoriIstituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy
Steven FurnellUniversity of Plymouth, United Kingdom

PROGRAM COMMITTEE MEMBERS

Magnus Almgren, Department of Computer Science and Engineering, Chalmers University of Technology, Sweden
Ja'far Alqatawna, CIS division, Higher Colleges of Technology, United Arab Emirates
Mario Alvim, Computer Science Department, Federal University of Minas Gerais (UFMG), Brazil
Morteza Amini, Computer Engineering, Sharif University of Technology, Iran, Islamic Republic of
Thibaud Antignac, DILS/LSL, CEA/DRT/LIST, France
Man H. Au, The Hong Kong Polytechnic University, Hong Kong
Alessandro Barenghi, Department of Electronics, Information and Bioengineering , Polytecnic University of Milan, Italy
Christos Bouras, Computer Engineering and Informatics Department, University of Patras, Greece
Francesco Buccafurri, DIIES, University of Reggio Calabria, Italy
Luigi Catuogno, Dipartimento di Informatica, Università degli Studi di Salerno, Italy
Hervé Chabanne, Idemia & Télécom Paris, France
Thomas Chen, City University London, United Kingdom
Rui Chen, Samsung Research America, United States
Feng Cheng, Hasso-Plattner-Institute at University of Potsdam, Germany
Hung-Yu Chien, information management, National Chi Nan University, Taiwan, Republic of China
Stelvio Cimato, Department of Computer Science, Università degli Studi di Milano, Italy
Mauro Conti, University of Padua, Italy
Gianpiero Costantino, Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy
Mathieu Cunche, CITI / Privatics, INSA-Lyon / Inria, France
Ashok Kumar Das, Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, India
Hervé Debar, Télécom SudParis, France
Andreas Dewald, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Isao Echizen, National Institute of Informatics, Japan
David Eyers, University of Otago, New Zealand
Oriol Farras, Universitat Rovira i Virgili, Spain
Mathias Fischer, IT-Security and Security Management Group, University Hamburg, Germany
Apostolos Fournaris, Electrical and Computer Engineering Dpt, University of Patras, Greece
Benjamin C. M. Fung, 3661 Peel Street, School of Information Studies, McGill University, Montreal, Canada
Alban Gabillon, Laboratoire GePaSud - Université de la Polynésie Française, French Polynesia
Clemente Galdi, Università di Salerno, Italy
Debin Gao, Singapore Management University, Singapore
Bok-Min Goi, Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Malaysia
Mario Goldenbaum, Electrical Engineering and Computer Science, Bremen University of Applied Sciences, Germany
Dieter Gollmann, TU Hamburg, Germany
Ana I. González-Tablas, University Carlos III of Madrid, Spain
Gilles Guette, University of Rennes, France
R. C. Hansdah, Dept. of Computer Science and Automation, Indian Institute of Science, Bangalore, India
Martin Hell, Department of Electrical and Information Technology, Lund University, Sweden
Guy Hembroff, School of Technology, Michigan Technological University, United States
Fu-Hau Hsu, Computer Science and Information Engineering, National Central University, Taiwan, Republic of China
Dieter Hutter, German Research Centre for Artificial Intelligence, Germany
Rafiqul Islam, School of Computing, Charles Sturt University, Australia
Mariusz Jakubowski, Microsoft Research alum, United States
Jens Jensen, STFC Rutherford Appleton Laboratory, United Kingdom
Mark G. Karpovsky, ECE, Boston University, United States
Anne Kayem, Internet Technologies and Systems, Hasso Plattner Institute, Germany
Joseph M. Kizza, Computer Science and Engineering, University of Tennessee-Chattanooga, United States
Elisavet Konstantinou, University of the Aegean, Greece
Hristo Koshutanski, Research and Innovation, Atos, Spain
Thomas Lagkas, Computer Science Department, International Hellenic University, Greece
Gianluca Lax, DIIES, University of Reggio Calabria, Italy
Gabriele Lenzini, Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg
Shujun Li, School of Computing, University of Kent, United Kingdom
Flamina Luccio, DAIS, Università Ca' Foscari Venezia, Italy
Ilaria Matteucci, Istituto di Informatica e Telematica, CNR, Italy
Vashek Matyas, Masaryk University, Czech Republic
Catherine Meadows, Code 5543, US Naval Research Laboratory, United States
Florian Mendel, IAIK, TU Graz, Austria
Nele Mentens, Katholieke Universiteit Leuven, Belgium
Ali Miri, Computer Science, Toronto Metropolitan University, Canada
Mattia Monga, Computer Science, Università degli Studi di Milano, Italy
Charles Morisset, Newcastle University, United Kingdom
Kirill Morozov, Department of Computer Science and Engineering, University of North Texas, United States
Ravi Mukkamala, Computer Science, Old Dominion University, United States
Paliath Narendran, Computer Science, State University of New York at Albany, United States
Antonino Nocera, DIIES, University Mediterrana of Reggio Calabria, Italy
Carles Padro, Applied Mathematics 4, Universitat Politecnica de Catalunya, Spain
Yin Pan, Computing Security, Rochester Institute of Technology, United States
Mauricio Papa, Computer Science, University of Tulsa, United States
Günther Pernul, University of Regensburg, Germany
Andreas Peter, Services, Cybersecurity, and Safety, University of Twente, Netherlands
Makan Pourzandi, Independent Researcher, Canada
Kenneth Radke, Information Security Institute, Queensland University of Technology, Australia
Wolfgang Reif, Institute for Software & Systems Engineering, University of Augsburg, Germany
Karen Renaud, University of Strathclyde, United Kingdom
Eike Ritter, University of Birmingham, United Kingdom
Jean-Marc Robert, Génie logiciel et des TIs, School of Higher Technology - University of Quebec, Canada
Neil Rowe, Computer Science, Naval Postgraduate School, United States
Antonio Ruiz-Martínez, Departament of Information and Communications Engineering, University of Murcia, Spain
Michaël Rusinowitch, Laboratoire Lorrain de Recherche en Informatique et Ses Applications, France
Nader S. Safa, Wolverhampton Cyber Research Institute, University of Wolverhampton, United Kingdom
David Sanchez, Computer Science and Mathematics, Universitat Rovira i Virgili, Spain
Andrea Saracino, Consiglio Nazionale delle Ricerche - Istituto di Informatica e Telematica, Italy
Michael Scott, Certivox Labs, Certivox Ltd, Ireland
Kent Seamons, Computer Science Department, Brigham Young University, United States
Qi Shi, School of Computing & Mathematical Sciences, Liverpool John Moores University, United Kingdom
Abdulhadi Shoufan, Khalifa University of Science, United Arab Emirates
Jordan Shropshire, Computer Information Systems, University of South Alabama, United States
Boris Skoric, Eindhoven University of Technology, Netherlands
Angelo Spognardi, Informatica, Sapienza Università di Roma, Italy
Paul Stankovski Wagner, Department of Electrical and Information Technology, Lund University, Sweden
Rainer Steinwandt, Mathematical Sciences, Florida Atlantic University, United States
Hung-Min Sun, Department of Computer Science, National Tsing Hua University, Taiwan, Republic of China
Cihangir Tezcan, Cyber Security, Middle East Technical University, Turkey
Ciza Thomas, Independent Researcher, India
Rafael T. Timoteo Timóteo de Sousa Jr, Electrical Engineering Department, National Science and Technology Institute on Cyber Security, Electrical Engineering Department, University of Brasília (UnB), P.O. Box 4466, Brasília–DF, CEP 70910-900, Brazil
Pierre U. Tournoux, LIM, Université de la Réunion, Reunion Island
Anthony TS Ho, University of Surrey, United Kingdom
Raylin Tso, Computer Science, National Chengchi University, Taiwan, Republic of China
Yasuyuki Tsukada, Kanto Gakuin University, Japan
Udaya Tupakula, University of Newcastle, Australia
Shambhu J. Upadhyaya, Computer Science and Engineering, University at Buffalo, United States
Catalin V. Birjoveanu, Department of Computer Science, Al.I.Cuza University of Iasi, Romania
Adriano Valenzano, CNR-IEIIT, Consiglio Nazionale delle Ricerche, Italy
Gilles Van Assche, STMicroelectronics, Belgium
Rakesh M. Verma, 4800 Calhoun Road, 501 PGH, University of Houston, United States
Artemios Voyiatzis, SBA Research, Austria
Adrian Waller, Independent Researcher, United Kingdom
Yong Wang, Beacom College of Computer and Cyber Sciences, Dakota State University, United States
Edgar Weippl, University of Vienna, SBA Research, Austria
Bing Wu, Math & Computer Science, Fayetteville State University, United States
Ping Yang, Binghamton University, United States
Ching-Nung Yang, Computer Science and Information Engineering, National Dong Hwa University, Taiwan, Republic of China
Alec F. Yasinsac, Independent Researcher, United States
Meng Yu, University of Texas at San Antonio, United States
Wenbing Zhao, Electrical and Computer Engineering, Cleveland State University, United States
Tianqing Zhu, Deakin University, Australia

footer