ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WISSE 2014 - Fourth International Workshop on Information Systems Security Engineering

Date2014-06-17

Deadline2014-02-15

VenueThessaloniki, Greece Greece

Keywords

Websitehttps://gsya.esi.uclm.es/WISSE2014

Topics/Call fo Papers

Fourth International Workshop on Information Systems Security Engineering - WISSE'14
To be held in conjunction with the 26th International Conference on Advanced Information Systems Engineering (CAiSE'14)
Thessaloniki, Greece, 16 - 20 June 2014
http://gsya.esi.uclm.es/WISSE2014/
*****************Important Dates************************
Regular Research and Experience Paper Submission: February 15, 2014
Demo/poster papers: March 11, 2014
Authors Notification: March 18, 2014
Camera Ready Submission: March 28, 2014
Workshop Date: June 17, 2014
********************************************************
Workshop Description
As modern Information systems support significant areas of the human society, which require storage and processing of sensitive personal and organisational information, security problems of information systems are currently a widespread and growing concern. The scientific community has realized the importance of aligning information systems engineering and security engineering in order to develop more secure information systems.
The International Workshop on Information System Security Engineering aims to provide a forum for researchers and practitioners to present, discuss and debate on one hand the latest research work on methods, models, practices and tools for secure information systems engineering, and on the other hand relevant industrial applications, recurring challenges, problems and industrial led solutions at the area of secure information systems engineering.
Topics of Interest
Topics of interest include, but are not limited to:
? Security and privacy requirements models and engineering
? Security and privacy analysis methods and models
? Security and privacy design methods and models
? Security and privacy testing methods and models
? Security and privacy modelling Support Tools
? Integrating functional, security and privacy requirements
? Threat-driven and Model-driven security
? Secure IS interoperability modelling
? Security and process modelling
? Modelling Security and Trust
? Managing Secure Software development
? Security in Agile Software Development Methods
? Methodologies and models for evaluating IS security and privacy aspects
? Formal methods for modelling security
? Models and approaches for the verification of security and privacy properties
? Approaches for managing security changes in IS
? Component-based, Aspect-oriented, Agent-based, Pattern-based Information system Security methods
? Methods, models and tools for workflow and Business Process Security
? Case studies in modelling secure IS
? Security Architectures and Patterns for Information Systems
? Semantic Web Technologies applied to Security
? Ontologies for IS security
? Security Engineering for specific Information Systems (e-Services, databases, mobile, internet, social networks, ...)
? Security Engineering for SOA Systems
? Methods for security reengineering
? Software Security Knowledge
? Enterprise Software Security

Last modified: 2013-12-06 06:50:16