WOSIS 2015 - 12th International Workshop on Security In Information Systems
Topics/Call fo Papers
Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc.
There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.
Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.
In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on security in Big Data. The enormous amount of external and unstructured data (referred as Big Data) has been increasing, and thus database systems and processing need to evolve to accommodate them to this new situation. Therefore, this new conception requires new models and methods that deal with the specific security issues related to Big Data. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such Big Data environments and that its adoption is not any problem for the society, administration and enterprise.
The novelty in this edition is the call for regular papers and tool demonstrations oriented and focused on Security applied to businesses and enterprises which is an opportunity for researchers, practitioners, security architects and designers to present and discuss the most recent advances, experiences, developments, applications, tools and challenges in the field of security in software engineering applied to businesses and enterprises.
IMPORTANT DATES
Paper Submission: February 3, 2015
Authors Notification: February 16, 2015
Camera Ready and Registration: March 3, 2015
WORKSHOP PROGRAM COMMITTEE
Andreas Bauer, National ICT Australia, Australia
Kevin Butler, University of Oregon, United States
Pino Caballero-Gil, Universidad de La Laguna, Spain
Juan Manuel Carrillo de Gea, Software Engineering Research Group, Spain
Mihai Christodorescu, IBM, United States
Ernesto Damiani, Università degli Studi di Milano, Italy
Sabrina de Capitani di Vimercati, Università degli Studi di Milano, Italy
Jaime Delgado, Universitat Politècnica de Catalunya, Spain
Csilla Farkas, University of South Carolina, United States
Eduardo B. Fernandez, Florida Atlantic University, United States
Maria Carmen Fernández, University of Málaga, Spain
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Steven Furnell, Plymouth University, United Kingdom
Paolo Giorgini, University of Trento, Italy
Debasis Giri, Haldia Institute of Technology, India
Renato Iannella, Semantic Identity, Australia
Shareeful Islam, University of East London, United Kingdom
Hugo Jonker, University of Luxembourg, Luxembourg
Jan Jürjens, Fraunhofer ISST and TU Dortmund, Germany
Stamatis Karnouskos, SAP, Germany
Spyros Kokolakis, University of the Aegean, Greece
Yair Levy, Nova Southeastern Universit, United States
Luigi Lo Iacono, Cologne University of Applied Sciences, Germany
Antonio Maña, University of Malaga, Spain
Raimundas Matulevicius, University of Tartu, Estonia
Sjouke Mauw, University of Luxembourg, Luxembourg
Haralambos Mouratidis, University of East London, United Kingdom
Federica Paci, University of Trento, Italy
Brajendra Panda, University of Arkansas, United States
Siani Pearson, HP Labs, Bristol, United Kingdom
Günther Pernul, University of Regensburg, Germany
Mario Piattini, Escuela Superior de Informatica, Spain
Indrajit Ray, Colorado State University, United States
Indrakshi Ray, Colorado State University, United States
Alfonso Rodriguez, University of Bio-Bio, Chile
Kouichi Sakurai, Kyushu university, Japan
Luis Enrique Sánchez, Universidad de las Fuerzas Armadas (ESPE-L), Spain
Luis Enrique Sánchez Crespo, , --- Select a Country ---
Thomas Santen, Microsoft Research Advanced Technology Labs Europe, Germany
Ketil Stoelen, Sintef, Norway
Ambrosio Toval, University of Murcia, Spain
Juan Trujillo, University of Alicante, Spain
Komminist Weldemariam, Queen's University, Canada
Duminda Wijesekera, George Mason University, United States
Toshihiro Yamauchi, Okayama University, Japan
George Yee, Carleton University, Canada
There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.
Security is, therefore, currently a widespread and growing concern that covers all areas of society: business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.
In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on security in Big Data. The enormous amount of external and unstructured data (referred as Big Data) has been increasing, and thus database systems and processing need to evolve to accommodate them to this new situation. Therefore, this new conception requires new models and methods that deal with the specific security issues related to Big Data. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such Big Data environments and that its adoption is not any problem for the society, administration and enterprise.
The novelty in this edition is the call for regular papers and tool demonstrations oriented and focused on Security applied to businesses and enterprises which is an opportunity for researchers, practitioners, security architects and designers to present and discuss the most recent advances, experiences, developments, applications, tools and challenges in the field of security in software engineering applied to businesses and enterprises.
IMPORTANT DATES
Paper Submission: February 3, 2015
Authors Notification: February 16, 2015
Camera Ready and Registration: March 3, 2015
WORKSHOP PROGRAM COMMITTEE
Andreas Bauer, National ICT Australia, Australia
Kevin Butler, University of Oregon, United States
Pino Caballero-Gil, Universidad de La Laguna, Spain
Juan Manuel Carrillo de Gea, Software Engineering Research Group, Spain
Mihai Christodorescu, IBM, United States
Ernesto Damiani, Università degli Studi di Milano, Italy
Sabrina de Capitani di Vimercati, Università degli Studi di Milano, Italy
Jaime Delgado, Universitat Politècnica de Catalunya, Spain
Csilla Farkas, University of South Carolina, United States
Eduardo B. Fernandez, Florida Atlantic University, United States
Maria Carmen Fernández, University of Málaga, Spain
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Steven Furnell, Plymouth University, United Kingdom
Paolo Giorgini, University of Trento, Italy
Debasis Giri, Haldia Institute of Technology, India
Renato Iannella, Semantic Identity, Australia
Shareeful Islam, University of East London, United Kingdom
Hugo Jonker, University of Luxembourg, Luxembourg
Jan Jürjens, Fraunhofer ISST and TU Dortmund, Germany
Stamatis Karnouskos, SAP, Germany
Spyros Kokolakis, University of the Aegean, Greece
Yair Levy, Nova Southeastern Universit, United States
Luigi Lo Iacono, Cologne University of Applied Sciences, Germany
Antonio Maña, University of Malaga, Spain
Raimundas Matulevicius, University of Tartu, Estonia
Sjouke Mauw, University of Luxembourg, Luxembourg
Haralambos Mouratidis, University of East London, United Kingdom
Federica Paci, University of Trento, Italy
Brajendra Panda, University of Arkansas, United States
Siani Pearson, HP Labs, Bristol, United Kingdom
Günther Pernul, University of Regensburg, Germany
Mario Piattini, Escuela Superior de Informatica, Spain
Indrajit Ray, Colorado State University, United States
Indrakshi Ray, Colorado State University, United States
Alfonso Rodriguez, University of Bio-Bio, Chile
Kouichi Sakurai, Kyushu university, Japan
Luis Enrique Sánchez, Universidad de las Fuerzas Armadas (ESPE-L), Spain
Luis Enrique Sánchez Crespo, , --- Select a Country ---
Thomas Santen, Microsoft Research Advanced Technology Labs Europe, Germany
Ketil Stoelen, Sintef, Norway
Ambrosio Toval, University of Murcia, Spain
Juan Trujillo, University of Alicante, Spain
Komminist Weldemariam, Queen's University, Canada
Duminda Wijesekera, George Mason University, United States
Toshihiro Yamauchi, Okayama University, Japan
George Yee, Carleton University, Canada
Other CFPs
- 3rd International Conference on Latest Trends of Computer Engineering and Information Technology
- 3rd International Conference on E-Learning and E-Educational Technology
- International Conference on Computer Science & Human Computer Interaction
- 2nd International Conference on Computer Supported Education and Information System
- 2015 International Conference on Urban Planning and Management (ICUPM 2015)
Last modified: 2014-12-08 23:19:15