SIS 2010 - 4th International Workshop on Secure Information Systems (SIS'10)
Topics/Call fo Papers
4th International Workshop on Secure Information Systems (SIS'10)
Wisła, Poland, October 18-20, 2010
The SIS workshop is envisioned as a forum to promote the exchange of ideas and results addressing complex security issues that arise in modern information systems. We aim at bringing together a community of security researchers and practitioners working in such divers areas as networking security, antivirus protection, intrusion detection, cryptography, security protocols, and others. We would like to promote an integrated view at the security of information systems.
As information systems evolve, becoming more complex and ubiquitous, issues relating to security, privacy and dependability become more critical. At the same time, the global and distributed character of modern computing ? typically involving interconnected heterogeneous execution environments ? introduces many new and challenging engineering and scientific problems. Providing protection against increasingly sophisticated attacks requires strengthening the interaction between different security communities, e.g. antivirus and networking. New technologies lead to the emergence of new threats and attack strategies, involving smart mobile devices, peer-to-peer networks, instant messaging, VoIP, mesh networks or even networked consumer devices, such as house appliances or cars. Furthermore, the increasing openness of the communications infrastructure results in novel threats and can jeopardize critical enterprise and public infrastructure, such as industrial automation and process control systems. Not only it is estimated that half of all Web applications and Internet storefronts still contain some security vulnerabilities, but secure commerce applications are also exposed to increasingly elaborate attacks, including spyware, phishing and other social engineering methods.
In order to develop a secure system, security has to be considered in all phases of the lifecycle and adequately addressed in all layers of the system. At the same time, good engineering has to take into account both scientific and economic aspects of every solution: the cost of security has to be carefully measured against its benefits ? in particular the expected cost of mitigated risks. Most companies and individuals treat security measures in information system as a necessary, but often uncomfortable, overhead. The increasing penetration of computing in all domains of everyday life means that security of critical business systems is often managed and maintained by personnel who are not knowledgeable in the field. This highlights the importance of usability and ease of configuration of security mechanism and protocols.
Covered topics include (but are not limited to):
Access control
Adaptive security
Cryptography
Copyright protection
Cyberforensics
Honeypots
Intrusion detection
Network security
Privacy
Secure commerce
Security exploits
Security policies
Security protocols
Security services
Security evaluation and prediction
Software protection
Trusted computing
Threat modeling
Usability and security
Viruses and worms
Zero-configuration security mechanisms
Wisła, Poland, October 18-20, 2010
The SIS workshop is envisioned as a forum to promote the exchange of ideas and results addressing complex security issues that arise in modern information systems. We aim at bringing together a community of security researchers and practitioners working in such divers areas as networking security, antivirus protection, intrusion detection, cryptography, security protocols, and others. We would like to promote an integrated view at the security of information systems.
As information systems evolve, becoming more complex and ubiquitous, issues relating to security, privacy and dependability become more critical. At the same time, the global and distributed character of modern computing ? typically involving interconnected heterogeneous execution environments ? introduces many new and challenging engineering and scientific problems. Providing protection against increasingly sophisticated attacks requires strengthening the interaction between different security communities, e.g. antivirus and networking. New technologies lead to the emergence of new threats and attack strategies, involving smart mobile devices, peer-to-peer networks, instant messaging, VoIP, mesh networks or even networked consumer devices, such as house appliances or cars. Furthermore, the increasing openness of the communications infrastructure results in novel threats and can jeopardize critical enterprise and public infrastructure, such as industrial automation and process control systems. Not only it is estimated that half of all Web applications and Internet storefronts still contain some security vulnerabilities, but secure commerce applications are also exposed to increasingly elaborate attacks, including spyware, phishing and other social engineering methods.
In order to develop a secure system, security has to be considered in all phases of the lifecycle and adequately addressed in all layers of the system. At the same time, good engineering has to take into account both scientific and economic aspects of every solution: the cost of security has to be carefully measured against its benefits ? in particular the expected cost of mitigated risks. Most companies and individuals treat security measures in information system as a necessary, but often uncomfortable, overhead. The increasing penetration of computing in all domains of everyday life means that security of critical business systems is often managed and maintained by personnel who are not knowledgeable in the field. This highlights the importance of usability and ease of configuration of security mechanism and protocols.
Covered topics include (but are not limited to):
Access control
Adaptive security
Cryptography
Copyright protection
Cyberforensics
Honeypots
Intrusion detection
Network security
Privacy
Secure commerce
Security exploits
Security policies
Security protocols
Security services
Security evaluation and prediction
Software protection
Trusted computing
Threat modeling
Usability and security
Viruses and worms
Zero-configuration security mechanisms
Other CFPs
- International Workshop on Real Time Software (RTS'10)
- 3rd International Symposium on Multimedia ? Applications and Processing (MMAP'10)
- 2nd International Workshop on Medical Informatics and Engineering (MI&E'10)
- Workshop on Scalable Computing in Distributed Systems & 8th Workshop on Large Scale Computations on Grids
- 10th International Multidisciplinary Conference on e-Commerce and e-Government (ECOM&EGOV'10)
Last modified: 2010-06-04 19:32:22