The International Conference on Information Systems Security and Privacy – ICISSP – aims to create a meeting point for practitioners and researchers interested in security and privacy challenges that concern information systems covering technological and social issues.
The format of the conference counts on technical sessions, poster sessions, tutorials, doctoral consortiums, panels, industrial tracks and keynote lectures. The papers presented in the conference are made available at the SCITEPRESS digital library, published in the conference proceedings and some of the best papers are invited to a post-publication with Springer,[1] in a CCIS Series book.
ICISSP also counts on keynote talks. Some of the invited speakers announced in the previous editions of the conference were: Ross J. Anderson (University of Cambridge, UK), Elisa Bertino (Purdue University, USA), Bart Preneel (KU Leuven, Belgium), Jason Hong (Carnegie Mellon University, USA) and Steven Furnell (University of Plymouth, UK).
Conference topics
edit- Access and Usage Control
- Risk and Reputation Management
- Security and Privacy in Cloud and Pervasive Computing
- Authentication, Privacy and Security Models
- Security Architecture and Design Analysis
- Security Awareness and Education
- Security Frameworks, Architectures and Protocols
- Security Testing
- Software Security Assurance
- Threat Awareness
- Vulnerability Analysis and Countermeasures
- Information Hiding and Anonymity
- Web Applications and Services
- Biometric Technologies and Applications
- Content Protection and Digital Rights Management
- Cryptographic Algorithms
- Data and Software Security
- Data Mining and Knowledge Discovery
- Database Security
- Identity and Trust management
- Trusted Computing
- Intrusion Detection and Response
- Legal and Regulatory Issues
- Malware Detection
- Mobile Systems Security
- Privacy Metrics and Control
- Privacy, Security and Trust in Social Media
- Privacy-Enhancing Models and Technologies
- Security in IoT and Edge Computing
- Distributed Ledgers and Blockchain Technologies and Applications
- AI and Machine Learning for Security
Editions and proceedings
editICISSP 2020 – Valletta, Malta
editProceedings of the 6th International Conference on Information Systems Security and Privacy. ISBN 978-989-758-359-9 [2]
ICISSP 2019 – Prague, Czech Republic
editProceedings of the 5th International Conference on Information Systems Security and Privacy. ISBN 978-989-758-081-9 [3]
Best Paper Award – Dayana Spagnuelo, Ana Ferreira and Gabriele Lenzini, “Accomplishing Transparency within the General Data Protection Regulation” [4]
Best Student Paper Award - Maja Nyman and Christine Große, “Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management” [5]
ICISSP 2018 – Funchal, Madeira, Portugal
editProceedings of the 4th International Conference on Information Systems Security and Privacy. ISBN 978-989-758-282-0 [6]
Best Paper Award – Wei-Han Lee, Jorge Ortiz, Bongjun Ko and Ruby Lee, “Inferring Smartphone Users’ Handwritten Patterns by using Motion Sensors” [7]
Best Student Paper Award - Vincent Haupert and Tilo Müller, “On App-based Matrix Code Authentication in Online Banking” [8]
ICISSP 2017 – Porto, Portugal
editProceedings of the 3rd International Conference on Information Systems Security and Privacy. ISBN 978-989-758-209-7 [9]
Best Paper Award – Lake Bu and Mark G. Karpovsky, “A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices” [10]
Best Student Paper Award - Iman Sedeeq, Frans Coenen and Alexei Lisitsa, “Attribute Permutation Steganography Detection using Attribute Position Changes Count” [11]
ICISSP 2016 – Rome, Italy
editProceedings of the 2nd International Conference on Information Systems Security and Privacy. ISBN 978-989-758-167-0 [12]
Best Paper Award – Christoph Kerschbaumer, Sid Stamm and Stefan Brunthaler. “Injecting CSP for Fun and Security” [13]
Best Student Paper Award - Kexin Qiao, Lei Hu and Siwei Sun, “Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques” [14]
ICISSP 2015 – ESEO, Angers, Loire Valley, France
editProceedings of the 1st International Conference on Information Systems Security and Privacy . ISBN 978-989-758-081-9 [15]
Best Paper Award - Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frincu and Viktor Prasanna. "Model-driven Privacy Assessment in the Smart Grid"[16][17]
Best Student Paper Award - Carsten Büttner and Sorin A. Huss. "A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks"[18]
References
edit- ^ Camp, Olivier; Weippl, Edgar; Bidan, Christophe; Aïmeur, Esma (2015-12-31). Information Systems Security and Privacy: First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers. Springer. ISBN 9783319276687.
- ^ "Proceedings of the 6th International Conference on Information Systems Security and Privacy".
- ^ "Proceedings of the 5th International Conference on Information Systems Security and Privacy".
- ^ Lenzini, Gabriele; Ferreira, Ana; Spagnuelo, Dayana (2019). "Accomplishing Transparency within the General Data Protection Regulation". Proceedings of the 5th International Conference on Information Systems Security and Privacy. pp. 114–125. doi:10.5220/0007366501140125. ISBN 978-989-758-359-9.
- ^ Große, Christine; Nyman, Maja (2019). "Are You Ready when It Counts? IT Consulting Firm's Information Security Incident Management". Proceedings of the 5th International Conference on Information Systems Security and Privacy. pp. 26–37. doi:10.5220/0007247500260037. ISBN 978-989-758-359-9.
- ^ "Proceedings of the 4th International Conference on Information Systems Security and Privacy".
- ^ Lee, Ruby; Ko, Bongjun; Ortiz, Jorge; Lee, Wei-Han (2018). "Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors". Proceedings of the 4th International Conference on Information Systems Security and Privacy. pp. 139–148. doi:10.5220/0006650301390148. ISBN 978-989-758-282-0.
- ^ Müller, Tilo; Haupert, Vincent (2018). "On App-based Matrix Code Authentication in Online Banking". Proceedings of the 4th International Conference on Information Systems Security and Privacy. pp. 149–160. doi:10.5220/0006650501490160. ISBN 978-989-758-282-0.
- ^ "Proceedings of the 3rd International Conference on Information Systems Security and Privacy".
- ^ g. Karpovsky, Mark; Bu, Lake (2017). "A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices". Proceedings of the 3rd International Conference on Information Systems Security and Privacy. pp. 233–242. doi:10.5220/0006270502330242. ISBN 978-989-758-209-7.
- ^ Lisitsa, Alexei; Coenen, Frans; Sedeeq, Iman (2017). "Attribute Permutation Steganography Detection using Attribute Position Changes Count". Proceedings of the 3rd International Conference on Information Systems Security and Privacy. pp. 95–100. doi:10.5220/0006166400950100. ISBN 978-989-758-209-7. S2CID 6224450.
- ^ "ICISSP 2016 dblp information".
- ^ Brunthaler, Stefan; Stamm, Sid; Kerschbaumer, Christoph (2016). "Injecting CSP for Fun and Security". Proceedings of the 2nd International Conference on Information Systems Security and Privacy (PDF). pp. 15–25. doi:10.5220/0005650100150025. ISBN 978-989-758-167-0.
- ^ Sun, Siwei; Hu, Lei; Qiao, Kexin (2016). "Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques". Proceedings of the 2nd International Conference on Information Systems Security and Privacy. pp. 74–84. doi:10.5220/0005684400740084. ISBN 978-989-758-167-0.
- ^ "ICISSP 2015 dblp information".
- ^ "Model-driven Privacy Assessment in the Smart Grid". Proceedings of the 1st International Conference on Information Systems Security and Privacy. 2015. pp. 173–181. CiteSeerX 10.1.1.590.5685. doi:10.5220/0005229601730181. ISBN 978-989-758-081-9.
- ^ Model-driven privacy assessment in the smart grid. IEEE Computer Society. February 2015. pp. 1–9. ISBN 9781467384056.
- ^ "A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks". Proceedings of the 1st International Conference on Information Systems Security and Privacy. 2015. pp. 259–269. doi:10.5220/0005238902590269. ISBN 978-989-758-081-9.