Conference Information
ISA' 2016: International Conference on Information Security and Assurance
http://www.conferen.org/ISA2016/Submission Date: |
2016-01-30 |
Notification Date: |
2016-02-15 |
Conference Date: |
2016-03-24 |
Location: |
Jeju Island, Korea |
Years: |
10 |
CORE: c Viewed: 14191 Tracked: 1 Attend: 0
Call For Papers
ISA 2016 will be the most comprehensive conference focused on the various aspects of advances in Information Security and Assurance. The concepts of Security and Assurance are emerging rapidly as an exciting new paradigm to provide reliable and safe life services.
Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Information Security and Assurance including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems.
The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Information Technology.
Conference Topics
The main topics include but will not be limited to: (Excellent surveying works in these areas are welcome, too.)
1) Security Engineering and Its Application
Security Level Definition Criteria and Its Application
Security Requirements Engineering
Security in System/Software/Product Development Site
Security in Development Processes
Security Maturity Model
Security Evaluation Criteria and Methodology
New Idea, Theory and Paradigm for Security
etc
2) Security and Assurance in Operational Area
Security Policy, Strategy and Management
Authentication and Identity Management
Security Education and Training
Personnel Security and Privacy
Trust Negotiation, Establishment and Management
Vulnerability, Threat, and Risk Analysis
etc
3) Security and Assurance in Technology Area
Agent and Mobile Code Security
Authorization and Access Control
Biometrics Security and Applications
Computer Forensics
Cryptographic Protocols
Data Integrity and Privacy
Database Security
Intrusion Detection and Prevention
Distributed System Security
Key Management and Recovery
Mobile and Ad hoc network security
Operating System Security
Secure Hardware and Software Design
Smartcards and Chip Security
RFID, Sensor Network, Ubiquitous Computing Security
etc
4) Security and Assurance in Commercial Area
Cell phone, PDA, and Potable Device Security
Biometrics Products and its Applications
Firewall, IDS, Anti-virus, and other Security Products
E-Commerce and E-Government Security
Intellectual Property Protection
Internet and Web Services Security
etc
5) Security and Assurance in Military Area
Information Warfare and Countermeasures
Cyber-attack and Cyber-terrorism
Anti-tamper and TEMPEST
Physical Security and Soldier Security
E-bomb and Electronic Attack
Tactical Communication and Network Security
Sensor-to-shooter/Command Control System Security
etc
6) Others
Last updated by Dou Sun in 2015-06-06
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| FUSION | International Conference on Information Fusion | 2024-07-07 |
| ACISP | Australasian Conference on Information Security and Privacy | 2025-07-14 |
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| INSCRYPT | International Conference on Information Security and Cryptology | 2025-10-19 |
| ICISC | International Conference on Information Security and Cryptology | 2015-11-25 |
| ISPEC | International Conference on Information Security Practice and Experience | 2024-10-25 |
| WISTP | International Conference on Information Security Theory and Practice | 2024-02-29 |
| ISC | Information Security Conference | 2025-10-20 |
| ISA' | International Conference on Information Security and Assurance | 2016-03-24 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| c | Journal of Information Security and Applications | 3.800 | Elsevier | 2214-2126 |
| Journal of Information Science | 1.800 | SAGE | 0165-5515 | |
| c | EURASIP Journal on Information Security | 2.500 | Springer | 1687-417X |
| b | Information Sciences | 6.8 | Elsevier | 0020-0255 |
| c | International Journal of Information and Computer Security | Inderscience | 1744-1765 | |
| a | IEEE Transactions on Information Forensics and Security | 6.300 | IEEE | 1556-6013 |
| Information Security Technical Report | Elsevier | 1363-4127 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |
| IET Information Security | 1.300 | IET |
| International Journal of Information Security | 2.400 | Springer |
| Journal of Information Security and Applications | 3.800 | Elsevier |
| Journal of Information Science | 1.800 | SAGE |
| EURASIP Journal on Information Security | 2.500 | Springer |
| Information Sciences | 6.8 | Elsevier |
| International Journal of Information and Computer Security | Inderscience | |
| IEEE Transactions on Information Forensics and Security | 6.300 | IEEE |
| Information Security Technical Report | Elsevier |