1st International Conference on Information Systems Security and Privacy - ICISSP 2015
Conference Areas:
Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:
1. DATA AND SOFTWARE SECURITY
2. TRUST
3. PRIVACY AND CONFIDENTIALITY
4. MOBILE SYSTEMS SECURITY
5. BIOMETRIC AUTHENTICATION
AREA 1: DATA AND SOFTWARE SECURITY
• Security Frameworks, Architectures and Protocols
• Cryptographic Algorithms
• Artificial Intelligence and Security
• Information Hiding and Anonymity
• Vulnerability Analysis and Countermeasures
• Data Integrity
• Database Security
• Content Protection and Digital Rights Management
• Data Mining
• Software Security Assurance
• Security Architecture and Design Analysis
• Security Testing
• Middleware Security
• Data Fraud and Data Fabrication
AREA 2: TRUST
• Computational Models of Trust
• Risk and Reputation Management
• Phishing
• Security and Trust in Pervasive Information Systems
• E-Commerce and Contract Management Tools
• Trusted Platforms
• P2P Transactions and Scenarios
• Common Practice, Legal and Regulatory Issues
• Trust in Social Networks
• Identity and Trust Management
• Intrusion Detection
• Smartcard Technology
• Trustworthy Embedded Devices
• Electronic Payment Fraud
AREA 3: PRIVACY AND CONFIDENTIALITY
• Privacy-Enhancing Models and Technologies
• Network Deployment and Management
• Web Applications and Services
• Privacy In Cloud and Pervasive Computing
• Authentication, Privacy and Security Models
• Privacy Compliance in Organizations
• Social Media Privacy
• User Profiling in E-Commerce Systems
• E-Voting and Privacy
• Privacy Metrics and Control
• Malware Detection
• Electronic Abuse Protection
• Ethics
AREA 4: MOBILE SYSTEMS SECURITY
• Location-based Services
• GPS-based security
• Mobile Sensing and Sensor Networks
• Bluetooth and RFID Security
• Privacy in Wireless Communications
• Mobile Applications Control
• Privacy-Preserving Protocols
• Vehicular Systems and Networks
• Secure Routing
• Software Vulnerabilities
• Access Control
• Threat Awareness
AREA 5: BIOMETRIC AUTHENTICATION
• Identification and Access Control
• Feature Detection, Selection and Extraction
• Biosignals in Biometrics
• Physiological Signal Processing
• Fingerprint, Face or Iris Recognition
• Hand Geometry
• Gait Analysis
• Speaker Recognition and Voice Analysis
• Behavioral Patterns
• Keystroke Dynamics
• Surveillance
• Privacy Concerns with Biometrics
• Multimodal Biometrics Systems
• Knowledge Discovery in Biometric Databases