Conference Information
ISA' 2016: International Conference on Information Security and Assurance
Please Login to view website of conference

Submission Date:
2016-01-30
Notification Date:
2016-02-15
Conference Date:
2016-03-24
Location:
Jeju Island, Korea
Years:
10
CORE: c   Viewed: 16212   Tracked: 1   Attend: 0

Call For Papers
ISA 2016 will be the most comprehensive conference focused on the various aspects of advances in Information Security and Assurance. The concepts of Security and Assurance are emerging rapidly as an exciting new paradigm to provide reliable and safe life services.

Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Information Security and Assurance including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems.

The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Information Technology.

Conference Topics

The main topics include but will not be limited to: (Excellent surveying works in these areas are welcome, too.)

1) Security Engineering and Its Application

Security Level Definition Criteria and Its Application
Security Requirements Engineering
Security in System/Software/Product Development Site
Security in Development Processes
Security Maturity Model
Security Evaluation Criteria and Methodology
New Idea, Theory and Paradigm for Security
etc

2) Security and Assurance in Operational Area

Security Policy, Strategy and Management
Authentication and Identity Management
Security Education and Training
Personnel Security and Privacy
Trust Negotiation, Establishment and Management
Vulnerability, Threat, and Risk Analysis
etc

3) Security and Assurance in Technology Area

Agent and Mobile Code Security
Authorization and Access Control
Biometrics Security and Applications
Computer Forensics
Cryptographic Protocols
Data Integrity and Privacy
Database Security
Intrusion Detection and Prevention
Distributed System Security
Key Management and Recovery
Mobile and Ad hoc network security
Operating System Security
Secure Hardware and Software Design
Smartcards and Chip Security
RFID, Sensor Network, Ubiquitous Computing Security
etc

4) Security and Assurance in Commercial Area

Cell phone, PDA, and Potable Device Security
Biometrics Products and its Applications
Firewall, IDS, Anti-virus, and other Security Products
E-Commerce and E-Government Security
Intellectual Property Protection
Internet and Web Services Security
etc

5) Security and Assurance in Military Area

Information Warfare and Countermeasures
Cyber-attack and Cyber-terrorism
Anti-tamper and TEMPEST
Physical Security and Soldier Security
E-bomb and Electronic Attack
Tactical Communication and Network Security
Sensor-to-shooter/Command Control System Security
etc

6) Others
Last updated by Dou Sun in 2015-06-06
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
bb3ICISSInternational Conference on Information Systems Security2026-07-102026-09-102026-12-16
cACISPAustralasian Conference on Information Security and Privacy2026-02-262026-04-162026-07-06
cINSCRYPTInternational Conference on Information Security and Cryptology2025-06-152025-08-012025-10-19
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
bISPECInternational Conference on Information Security Practice and Experience2024-05-132024-06-242024-10-25
cb1FUSIONInternational Conference on Information Fusion2024-03-012024-05-012024-07-07
cWISTPInternational Conference on Information Security Theory and Practice2024-01-152024-02-052024-02-29
cISA'International Conference on Information Security and Assurance2016-01-302016-02-152016-03-24
cIASInternational Conference on Information Assurance and Security 2015-10-212015-11-102015-12-07
bICISCInternational Conference on Information Security and Cryptology2015-09-072015-10-192015-11-25
Related Journals
CCFFull NameImpact FactorPublisherISSN
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
bInformation Sciences6.8Elsevier0020-0255
cJournal of Information Security and Applications3.7Elsevier2214-2126
International Journal of Information Security3.2Springer1615-5262
The Information Society3.0Taylor & Francis0197-2243
cEURASIP Journal on Information Security2.1Springer1687-417X
Journal of Information Science1.7SAGE0165-5515
cIET Information Security1.300IET1751-8709
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650
cDiscover ComputingSpringer2948-2992