Call for Papers
Home
Call for Papers
Special Session/
Workshop

Paper Submission
Dates and Deadlines
Keynote Speakers
Plenary Speakers
Proceedings
Committee
Registration
Accommodation
Contact Information
Co-located Conferences


Past ISA

ISA-09
ISA-08

IAN-07

 



http://www.sersc.org/ISA2010

June 23 ~ 25, 2010, at Sheraton Grande Ocean Resort, in Miyazaki, Japan


Download CFP ( PDF , DOC )

The 4th International Conference on Information Security and Assurance (ISA 2010) will be take place on June 23 - 25, 2010, at Sheraton Grande Ocean Resort, in Miyazaki, Japan.

ISA 2010 will be the most comprehensive conference focused on the various aspects of advances in Information Security and Assurance. The concepts of Security and Assurance are emerging rapidly as an exciting new paradigm to provide reliable and safe life services.

Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Information Security and Assurance including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems.

ISA 2010 is a successor of the 1st International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island, Korea, December, 2007), the 2nd International Conference on Information Security and Assurance (ISA-08, Busan, Korea, April 2008) and the 3rd International Conference on Information Security and Assurance (ISA-09, Seoul, Korea, June 2009).

The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Information Technology.

Conference Topics

The main topics include but will not be limited to: (Excellent surveying works in these areas are welcome, too.)


1) Security Engineering and Its Application
  • Security Level Definition Criteria and Its Application
  • Security Requirements Engineering
  • Security in System/Software/Product Development Site
  • Security in Development Processes
  • Security Maturity Model
  • Security Evaluation Criteria and Methodology
  • New Idea, Theory and Paradigm for Security
  • etc

2) Security and Assurance in Operational Area
  • Security Policy, Strategy and Management
  • Authentication and Identity Management
  • Security Education and Training
  • Personnel Security and Privacy
  • Trust Negotiation, Establishment and Management
  • Vulnerability, Threat, and Risk Analysis
  • etc

3) Security and Assurance in Technology Area
  • Agent and Mobile Code Security
  • Authorization and Access Control
  • Biometrics Security and Applications
  • Computer Forensics
  • Cryptographic Protocols
  • Data Integrity and Privacy
  • Database Security
  • Intrusion Detection and Prevention
  • Distributed System Security
  • Key Management and Recovery
  • Mobile and Ad hoc network security
  • Operating System Security
  • Secure Hardware and Software Design
  • Smartcards and Chip Security
  • RFID, Sensor Network, Ubiquitous Computing Security
  • etc

4) Security and Assurance in Commercial Area
  • Cell phone, PDA, and Potable Device Security
  • Biometrics Products and its Applications
  • Firewall, IDS, Anti-virus, and other Security Products
  • E-Commerce and E-Government Security
  • Intellectual Property Protection
  • Internet and Web Services Security
  • etc

5) Security and Assurance in Military Area
  • Information Warfare and Countermeasures
  • Cyber-attack and Cyber-terrorism
  • Anti-tamper and TEMPEST
  • Physical Security and Soldier Security
  • E-bomb and Electronic Attack
  • Tactical Communication and Network Security
  • Sensor-to-shooter/Command Control System Security
  • etc


6) Others

 
copyright © 2009-2010 SERSC all rights reserved