Seventh International Conference on Information Systems Security
(ICISS 2011)
15-19 December 2011, Jadavpur University, Kolkata
http://www.iciss.org.in

REGISTRATION

 

 

 

PROCEEDINGS

CONTACT US

Our Sponsors
Proceedings Sponsor:
Centre of Excellence on Cryptology
Indian Statistical Institute, Kolkata


Tutorials Sponsor:
Birla Institute of Technology, Mesra, Kolkata Campus

Banquet Sponsor:
M/s. HP India Sales Pvt. Ltd.

Other Sponsors:
Advanced System Lab, DRDO, Hyderabad

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SPONSORS

Tutorials on 15 & 16 December, 2011
Conference on 17 - 19 December,  2011

Conference & Tutorials Venue:
Dr.Triguna Sen Auditorium
Alumni Association Building
Near Gate no. 3
Jadavpur University
Kolkata – 700032

Cultural Program Venue:
Gandhi Bhavan Auditorium
Alumni Association Building
Jadavpur University
Kolkata – 700032


Cultural Program on 18th December, 2011, at 6:30p.m.
Cultural Programme: "Laser Fantasy" by Denver, USA based worldr enowned laserist Manick Sorcar and his group. A two hour extravaganza of dance-drama-magic in combination with life-size laser animation and visual spectacles in space.
(www.facebook.com/manicksorcar)



The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating latest research results in information and systems security. ICISS 2011, the seventh conference in this series, will be held under the aegis of the newly formed Society for Research in Information Security and Privacy(SRISP). The acceptance ratio of the first six conferences has averaged less than 30%. Like previous years, the proceedings will be published as part of the Springer Verlag series of Lecture Notes in Computer Science (LNCS).

Keynote speakers

·        ANUPAM DUTTA , Assistant Research Professor, Carnegie Mellon University. Topic : Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms

·        DAVID EVANS, Associate Professor of Computer Science, University of Virginia. Topic : Secure Computation in the Real(ish) World

·        VIPUL GOYAL, Microsoft Research, Bangalore, India. Topic : Secure Composition of Cryptographic Protocols

·       WILLIAM ENCK, Assistant Professor in the Department of Computer Science at North Carolina State University, USA. Topic : Defending Users Against Smartphone Apps:                Techniques and Future Directions

 Tutorials 

·         Bjørnar Solhaug, PhD, Research scientist, SINTEF ICT, Norway. Topic: Analysing risk in practice: The CORAS approach to model-driven risk analysis

·         Amiya Bhattacharya, PhD, Assistant Research Professor, School of Computing, Informatics and Decision Systems Engineering, Arizona State University. Topic: Security and Privacy aspects of Smartphones and Tablets

·         Sourav Sen Gupta, Researcher, Centre of Excellence in Cryptology, Indian Staistical Institute, Kolkata – 700 108, India. Topic: Research Methodology in Cryptography and Information Security

·         Rajat Subhra Chakraborty, PhD, Assistant Professor , Dept. of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India – 721302. Topic: Hardware Trojans: Challenges and Emerging Solutions 

Accepted Papers 

      • Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing. Secured Cloud Storage Scheme using ECC based Key Management in User Hierarchy
• Ravi Shankar Yadav, Praveen Likhar, M Keshava Rao. SecWEM: A Security Solution for Web based E-mail
• Meilof Veeningen, Nicola Zannone, Benne De Weger. Formal Privacy Analysis of Communication Protocols for Identity Management
• Ruchira Naskar, Rajat Subhra Chakraborty. Reversible Image Watermarking through Coordinate Logic Operation based Prediction
• Pieter Burghouwt, Marcel Spruit, Henk Sips. Towards Detection of Botnet Communication through Social Media by Monitoring User Activity
• Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Me. Flow based interpretation of access control: Detection of illegal information flows
• Federico Maggi, Adnrea Bellini, Guido Salvaneschi, Stefano Zanero. Finding Non-trivial Malware Naming Inconsistencies
• Filippo Del Tedesco, Sebastian Hunt, David Sands. A Semantic Hierarchy for Erasure Policies
• Anuj Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera. Preserving Location Privacy for Continuous Queries on Known Route
• Dimitris Geneiatakis, Georgios Portokalidis, Angelos Keromytis. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability Against DoS
• Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar. Some Combinatorial Results Towards State Recovery Attack on RC4
• Julien Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia. Consistency Policies for Dynamic Information Systems with Declassification Flows
• Faraz Ahmed, M Zubair Rafique, Muhammad Abulaish. A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing attacks
• Ram Krishnan, Ravi Sandhu. Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing
• Indivar Gupta, P K Saxena. Distributed Signcryption from Pairings
• Puneet Gupta, Scott Stoller, Zhongyuan Xu. Abductive Analysis of Administrative Policies in Rule-based Access Control
• Harini Ragavan, Brajendra Panda. Mitigation of Malicious Modifications by Insiders in Databases
• Prithu Banerjee, Mahasweta Mitra, Ferdous Barbhuiya, Sandip Chakraborty, Sukumar Nandi. An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks
• Lorenzo Cavallaro, R Sekar. Taint-Enhanced Anomaly Detection
• Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci. Load Time Security Verification
• Winfried Kühnhauser, Anja Pölck. Access Control Model Engineering (Short Paper)
• Christian Schneider, Jonas Pfoh, Claudia Eckert. A Universal Semantic Bridge for Virtual Machine Introspection (Short Paper)
• Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili. A Signature Based Approach of Correctness Assurance in Data Outsourcing Scenarios (Short Paper)
• Tanusha Nadkarni. IFrandbox - Client Side Protection from Malicious Injected Iframes (Short Paper)

 

 

Past ICISS Conferences

15-19 December 2010 DA-IICT,
Gandhinagar Gujarat, India

14-18 December 2009 Eastern Zone
Cultural Center, Kolkata, India

16-20 December 2008 JNTU,
Hyderabad, India

16-20 December 2007
University of Delhi, India

17-21 December 2006
Indian Statistical institute, Kolkata, India

19-21 December 2005
Center For Distributed Computing,
Jadavpur University, Kolkata, India

 

IMPORTANT DATES

  • Manuscript Submission : 25 July 2011 (Monday) [CLOSED]

  • Tutorial Proposal Submission : 22 July 2011 [CLOSED]

  • Notification of Acceptance : 09 September 2011    17 September 2011 

  • Camera-Ready Manuscript : 23 September 2011    30 September 2011

 

 

 

SRISP © All Rights Reserved