[agents] Call for Papers :: Emerging Aspects in Information Security (EAIS'14) Workshop

Ali Ismail Awad alamer_2005 at yahoo.com
Fri Mar 7 14:27:22 EST 2014



Dear Colleagues,

[ Please accept my apologies if you receive multiple copies of this call]

Emerging Aspects in Information Security (EAIS'14)
Warsaw, Poland, 7 - 10 September, 2014
https://fedcsis.org/eais 


Admittedly, information security works as a 
backbone for protecting both user data and electronic transactions. 
Protecting the communication and data infrastructure of an increasingly 
inter-connected world has become vital nowadays. Security has emerged as an important scientific discipline whose many multifaceted complexities deserve the attention and synergy of the computer science, engineering, and information systems communities. Information security has some 
well-founded technical research directions which encompass access level 
(user authentication and authorization), protocol security, software 
security, and data cryptography. Moreover, some other emerging topics 
related to organizational security aspects have appeared beyond the 
long-standing research directions.
The Emerging Aspects in Information Security (EAIS 2014) workshop focuses on the diversity of the information security 
developments and deployments in order to highlight the most recent 
challenges and report the most recent researches. The workshop is an 
umbrella for all information security technical aspects. In addition, it goes beyond the technicalities and covers some emerging topics like 
social and organizational security research directions. EAIS 2014 is 
intended to attract researchers and practitioners from academia and 
industry, and provides an international discussion forum in order to 
share their experiences and their ideas concerning emerging aspects in 
information security met in different application domains. This opens 
doors for highlighting unknown research directions and tackling modern 
research challenges. The objectives of the EAIS 2014 workshop can be 
summarized as follows:
	* To review and conclude researches in information security and other 
security domains, focused on the protection of different kinds of assets and processes, and to identify approaches that may be useful in the 
application domains of information security
	* To find synergy between different approaches, allowing to elaborate 
integrated security solutions, e.g. integrate different risk-based 
management systems
	* To exchange security-related knowledge and experience between experts 
to improve existing methods and tools and adopt them to new application 
areas
	* To present latest security challenges, especially with respect to EC Horizon 2020
Topics
Topics of interest include but are not limited to:
	* Biometric technologies
	* Human factor in security
	* Cryptography and cryptanalysis
	* Critical infrastructure protection
	* Hardware-oriented information security
	* Social theories in information security
	* Organization- related information security
	* Pedagogical approaches for information security
	* Individual identification and privacy protection
	* Information security and business continuity management
	* Decision support systems for information security
	* Digital right management and data protection
	* Cyber and physical security infrastructures
	* Risk assessment and risk management in different application domains
	* Tools supporting security management and development
	* Emerging technologies and applications
	* Digital forensics and crime science
	* Misuse and intrusion detection
	* Security knowledge management
	* Data hide and watermarking
	* Cloud and big data security
	* Computer network security
	* Security and safety
	* Assurance methods
	* Security statistics
Paper submission
	* Authors should submit draft papers (as Postscript, PDF of MSWord file).
	* The total length of a paper should not exceed 10 pages IEEE style 
(including tables, figures and references). IEEE style templates are 
available here.
	* Papers will be refereed and accepted on the basis of their scientific merit and relevance to the workshop.
	* Preprints containing accepted papers will be published on a USB memory stick provided to the FedCSIS participants.
	* Only papers presented at the conference will be submitted for inclusion in the IEEE Xplore® database.
	* Conference proceedings will be published in a volume with ISBN and ISSN numbers and posted at the conference WWW site.
	* Conference proceedings will be submitted for indexation in: Thomson Reuters - Conference Proceedings Citation Index, SciVerse Scopus, Inspec, DBLP Computer Science Bibliography and Google Scholar
	* Extended versions of selected papers presented during the conference will be published as Special Issue(s) of 
	* Informatica (Slovenia)
	* EURASIP Journal on Information Security (Open Access)
	* Theoretical and Applied Informatics
	* Organizers reserve right to move accepted papers between FedCSIS events.
Important dates:
	* Call for event proposals: April 12, 2014
	* Paper submission: Friday Apr 11 2014 11:59:59 pm HST
	* Position paper submission: May 11, 2014
	* Acceptance decision: May 18, 2014
	* Final version of paper submission: June 16, 2014
	* Final deadline for discounted fee: July 30, 2014
	* Conference dates: September 7-10, 2014
=============================================================================================================


More information about the agents mailing list