http://www.sersc.org/ISA2010
June 23 ~ 25, 2010, at Sheraton Grande Ocean Resort, in Miyazaki, Japan
The 4th International Conference on Information Security and Assurance (ISA 2010) will be take place on June 23 - 25, 2010, at Sheraton Grande Ocean Resort, in Miyazaki, Japan.
ISA 2010 will be the most comprehensive conference focused on the various aspects of advances in Information Security and Assurance. The concepts of Security and Assurance are emerging rapidly as an exciting new paradigm to provide reliable and safe life services.
Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Information Security and Assurance including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems.
ISA 2010 is a successor of the 1st International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island, Korea, December, 2007), the 2nd International Conference on Information Security and Assurance (ISA-08, Busan, Korea, April 2008) and the 3rd International Conference on Information Security and Assurance (ISA-09, Seoul, Korea, June 2009).
The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Information Technology.
Conference Topics
The main topics include but will not be limited to: (Excellent surveying works in these areas are welcome, too.)
1) Security Engineering and Its Application
Security Level Definition Criteria and Its Application
Security Requirements Engineering
Security in System/Software/Product Development Site
Security in Development Processes
Security Maturity Model
Security Evaluation Criteria and Methodology
New Idea, Theory and Paradigm for Security
etc
2) Security and Assurance in Operational Area
Security Policy, Strategy and Management
Authentication and Identity Management
Security Education and Training
Personnel Security and Privacy
Trust Negotiation, Establishment and Management
Vulnerability, Threat, and Risk Analysis
etc
3) Security and Assurance in Technology Area
Agent and Mobile Code Security
Authorization and Access Control
Biometrics Security and Applications
Computer Forensics
Cryptographic Protocols
Data Integrity and Privacy
Database Security
Intrusion Detection and Prevention
Distributed System Security
Key Management and Recovery
Mobile and Ad hoc network security
Operating System Security
Secure Hardware and Software Design
Smartcards and Chip Security
RFID, Sensor Network, Ubiquitous Computing Security
etc
4) Security and Assurance in Commercial Area
Cell phone, PDA, and Potable Device Security
Biometrics Products and its Applications
Firewall, IDS, Anti-virus, and other Security Products
E-Commerce and E-Government Security
Intellectual Property Protection
Internet and Web Services Security
etc
5) Security and Assurance in Military Area
Information Warfare and Countermeasures
Cyber-attack and Cyber-terrorism
Anti-tamper and TEMPEST
Physical Security and Soldier Security
E-bomb and Electronic Attack
Tactical Communication and Network Security
Sensor-to-shooter/Command Control System Security
etc
Subission Deadline: January 30, 2010
Authors Notification: February 28, 2010
Final Manuscript Submission and Registration Due: March 20, 2010
http://www.sersc.org/ISA2010/
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment