The 1st National Information System Security Workshop, ISS 2016

Call for Papers

Important Dates

1. Submission deadline:May 20, 2016

2. Notification of acceptance: July 20, 2016

3. Camera ready: August 10, 2016

4. Conference date: September23-25, 2016

Contributions Requirements

1.Papers should be submitted online in this symposium. Multiple submissions are not allowed. Manuscripts should be submitted through the Easychair system, please add ISS2016 after the title of the Title column in the Easychair system after submitting manuscripts ISS2016 should also be added at the end of paper's title.

2.Both Chinese and English papers are acceptable. The English manuscript is set according to the standard format of the IEEE paper, papers should not exceed 6 pages. Please refer to the following link for English paper template:

http://www.ieee.org/publications_standards/publications/conferences/2014_04_msw_a4_format.doc

Chinese manuscript according to "Computer Engineering" magazine format requirements, are usually not more than 6000 words. Please refer to the following link for English paper template:

http://www.ecice06.com/CN/column/column307.shtml

3.The manuscript requires the use of WORD or PDF format. In order to facilitate the publication process, manuscripts annex must contain English abstracts, keywords, funding information and major references, all author information and author introduction,and indicate the corresponding author's name, affiliation, full postal address, Email address and phone.

4. "Journal of Software" Information Systems Security Special Issue Call for Papers see:

http://www.jos.org.cn/ch/reader/view_news.aspx?id=20160418032212506

Chairs

Yong Qi (Xi'an Jiao Tong University)
Guojun Wang(Central South University)

Contact information

1.Submission address:
https://easychair.org/conferences/?conf=wisa2016

Contributors Contact:
Xiaoguang Wang
Xi'an Jiao Tong University(xgwang9@hotmail.com

2.Conference website:http://idc.hust.edu.cn/wisa2016/

3.Conference case:
Minquan Wu, Wuhan University(rjgc@whu.edu.cn)

The 1st National Information System Security Workshop, hosted by China Computer Federation (CCF) and CCF Information Systems Special Committee, will be convened in coordination with the 13th National Conference on Web Information Systems and Applications on September 23-25, 2016 in Wuhan, Hubei Province. The Workshop will focus on hot issues, key technologies and typical applications in the field of Information System Security for exchanging ideas and presentation of progress.
Papers in the field of information system security are invited to submit to the workshop, including papers on information security research, theories, state-of-the-art practice and experience reports from ongoing industry-based research, lessons learned from implemented projects and practical experience.The conference proceedings (accepted papers written in English) will be published by IEEE Reliability Society. Papers presented at the conference will also be submitted for inclusion into the IEEE Xplore and to all of the A&I (abstracting and indexing) partners (such as the EI Compendex), and accepted papers in Chinese will be published in Computer & Digital Engineering. Outstanding papers will be recommended to publish in Computer Science and Computer Engineering, particularly outstanding papers will be recommended to publish in Special Issue of Information System Security of Journal of Software.

Major topics include (but not limited to)

    1.Information security

  • The identity authentication and management
  • Password system analysis, building and application
  • Access control theory, model and method
  • The security policy and evaluation
  • Security audit
  • 2.System security

  • The database system security
  • The operating system security
  • Distributed system security
  • Cloud computing security
  • Big data processing system security
  • Mobile system security
  • Web system security
  • 3.The hardware system security

  • System structure of security
  • The storage system security
  • The virtual machine security
  • The embedded system security
  • Intelligent terminal security
  • Security chip
  • 4.Software security and protocol analysis

  • Malware analysis
  • The source code and binary automatic analysis technology
  • Network security protocol analysis
  • Malicious code forensics technology
  • Hole digging and using the technology
  • 5.Cyber security

  • Network attack and defense space
  • Network space surveillance and incident response
  • Network infrastructure security
  • Wireless network security space
  • Sensor network security
  • Software define network security
  • Data center network security
  • 6.Application system security

  • The electronic commerce security
  • E-government security
  • Mobile payment security
  • Electronic medical safety
  • Wisdom city security
  • Social public security