International Conference on Information Systems Security and Privacy
The International Conference on Information Systems Security and Privacy – ICISSP – aims to create a meeting point for practitioners and researchers interested in security and privacy challenges that concern information systems covering technological and social issues.
The format of the conference counts on technical sessions, poster sessions, tutorials, doctoral consortiums, panels, industrial tracks and keynote lectures. The papers presented in the conference are made available at the SCITEPRESS digital library, published in the conference proceedings and some of the best papers are invited to a post-publication with Springer,{{cite book|last1=Camp|first1=Olivier|last2=Weippl|first2=Edgar|last3=Bidan|first3=Christophe|last4=Aïmeur|first4=Esma|title=Information Systems Security and Privacy: First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers|url=https://books.google.com/books?id=9LZPCwAAQBAJ&pg=PR6|publisher=Springer|isbn=9783319276687|date=2015-12-31}} in a [https://link.springer.com/book/10.1007%2F978-3-319-27668-7 CCIS Series book].
ICISSP also counts on keynote talks. Some of the invited speakers announced in the previous editions of the conference were: Ross J. Anderson (University of Cambridge, UK), Elisa Bertino (Purdue University, USA), Bart Preneel (KU Leuven, Belgium), Jason Hong (Carnegie Mellon University, USA) and Steven Furnell (University of Plymouth, UK).
{{TOC limit|4}}
Conference topics
- Access and Usage Control
- Risk and Reputation Management
- Security and Privacy in Cloud and Pervasive Computing
- Authentication, Privacy and Security Models
- Security Architecture and Design Analysis
- Security Awareness and Education
- Security Frameworks, Architectures and Protocols
- Security Testing
- Software Security Assurance
- Threat Awareness
- Vulnerability Analysis and Countermeasures
- Information Hiding and Anonymity
- Web Applications and Services
- Biometric Technologies and Applications
- Content Protection and Digital Rights Management
- Cryptographic Algorithms
- Data and Software Security
- Data Mining and Knowledge Discovery
- Database Security
- Identity and Trust management
- Trusted Computing
- Intrusion Detection and Response
- Legal and Regulatory Issues
- Malware Detection
- Mobile Systems Security
- Privacy Metrics and Control
- Privacy, Security and Trust in Social Media
- Privacy-Enhancing Models and Technologies
- Security in IoT and Edge Computing
- Distributed Ledgers and Blockchain Technologies and Applications
- AI and Machine Learning for Security
Editions and proceedings
=[http://www.icissp.org/?y=2020 ICISSP 2020] – Valletta, Malta=
Proceedings of the 6th International Conference on Information Systems Security and Privacy. {{ISBN|978-989-758-359-9}} {{cite web|title=Proceedings of the 6th International Conference on Information Systems Security and Privacy|url=https://dblp.uni-trier.de/search?q=ICISSP%202020}}
=[http://www.icissp.org/?y=2019 ICISSP 2019] – Prague, Czech Republic=
Proceedings of the 5th International Conference on Information Systems Security and Privacy. {{ISBN|978-989-758-081-9}} {{cite web|title=Proceedings of the 5th International Conference on Information Systems Security and Privacy|url=https://dblp.uni-trier.de/search?q=ICISSP%202019}}
Best Paper Award – Dayana Spagnuelo, Ana Ferreira and Gabriele Lenzini, “Accomplishing Transparency within the General Data Protection Regulation” {{cite book |last1=Lenzini |first1=Gabriele |last2=Ferreira |first2=Ana |last3=Spagnuelo |first3=Dayana |title=Proceedings of the 5th International Conference on Information Systems Security and Privacy |chapter=Accomplishing Transparency within the General Data Protection Regulation |year=2019 |pages=114–125 |doi=10.5220/0007366501140125 |isbn=978-989-758-359-9 |doi-access=free}}
Best Student Paper Award - Maja Nyman and Christine Große, “Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management” {{cite book |last1=Große |first1=Christine |last2=Nyman |first2=Maja |title=Proceedings of the 5th International Conference on Information Systems Security and Privacy |chapter=Are You Ready when It Counts? IT Consulting Firm's Information Security Incident Management |year=2019 |pages=26–37 |doi=10.5220/0007247500260037 |isbn=978-989-758-359-9 |doi-access=free}}
=[http://www.icissp.org/?y=2018 ICISSP 2018] – Funchal, Madeira, Portugal=
Proceedings of the 4th International Conference on Information Systems Security and Privacy. {{ISBN|978-989-758-282-0}} {{cite web|title=Proceedings of the 4th International Conference on Information Systems Security and Privacy|url=http://dblp.uni-trier.de/search?q=ICISSP%202018}}
Best Paper Award – Wei-Han Lee, Jorge Ortiz, Bongjun Ko and Ruby Lee, “Inferring Smartphone Users’ Handwritten Patterns by using Motion Sensors” {{cite book |last1=Lee |first1=Ruby |last2=Ko |first2=Bongjun |last3=Ortiz |first3=Jorge |last4=Lee |first4=Wei-Han |title=Proceedings of the 4th International Conference on Information Systems Security and Privacy |chapter=Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors |year=2018 |pages=139–148 |doi=10.5220/0006650301390148 |isbn=978-989-758-282-0 |doi-access=free}}
Best Student Paper Award - Vincent Haupert and Tilo Müller, “On App-based Matrix Code Authentication in Online Banking” {{cite book |last1=Müller |first1=Tilo |last2=Haupert |first2=Vincent |title=Proceedings of the 4th International Conference on Information Systems Security and Privacy |chapter=On App-based Matrix Code Authentication in Online Banking |year=2018 |pages=149–160 |doi=10.5220/0006650501490160 |isbn=978-989-758-282-0 |doi-access=free}}
=[http://www.icissp.org/?y=2017 ICISSP 2017] – Porto, Portugal=
Proceedings of the 3rd International Conference on Information Systems Security and Privacy. {{ISBN|978-989-758-209-7}} {{cite web|title=Proceedings of the 3rd International Conference on Information Systems Security and Privacy|url=http://dblp.uni-trier.de/search?q=ICISSP%202017}}
Best Paper Award – Lake Bu and Mark G. Karpovsky, “A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices” {{cite book |last1=g. Karpovsky |first1=Mark |last2=Bu |first2=Lake |title=Proceedings of the 3rd International Conference on Information Systems Security and Privacy |chapter=A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices |year=2017 |pages=233–242 |doi=10.5220/0006270502330242 |isbn=978-989-758-209-7 |doi-access=free}}
Best Student Paper Award - Iman Sedeeq, Frans Coenen and Alexei Lisitsa, “Attribute Permutation Steganography Detection using Attribute Position Changes Count” {{cite book |last1=Lisitsa |first1=Alexei |last2=Coenen |first2=Frans |last3=Sedeeq |first3=Iman |title=Proceedings of the 3rd International Conference on Information Systems Security and Privacy |chapter=Attribute Permutation Steganography Detection using Attribute Position Changes Count |year=2017 |pages=95–100 |doi=10.5220/0006166400950100 |isbn=978-989-758-209-7|s2cid=6224450 }}
=[http://www.icissp.org/?y=2016 ICISSP 2016] – Rome, Italy=
Proceedings of the 2nd International Conference on Information Systems Security and Privacy. {{ISBN|978-989-758-167-0}} {{cite web|title=ICISSP 2016 dblp information|url=http://dblp.uni-trier.de/search?q=ICISSP+2016}}
Best Paper Award – [http://www.christophkerschbaumer.com/ Christoph Kerschbaumer], [http://research.sidstamm.com/ Sid Stamm] and Stefan Brunthaler. “Injecting CSP for Fun and Security” {{cite book |last1=Brunthaler |first1=Stefan |url=http://research.sidstamm.com/papers/csp_icissp_2016.pdf |last2=Stamm |first2=Sid |last3=Kerschbaumer |first3=Christoph |title=Proceedings of the 2nd International Conference on Information Systems Security and Privacy |chapter=Injecting CSP for Fun and Security |year=2016 |isbn=978-989-758-167-0 |pages=15–25 |doi=10.5220/0005650100150025}}
Best Student Paper Award - Kexin Qiao, Lei Hu and Siwei Sun, “Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques” {{cite book |last1=Sun |first1=Siwei |last2=Hu |first2=Lei |last3=Qiao |first3=Kexin |title=Proceedings of the 2nd International Conference on Information Systems Security and Privacy |chapter=Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques |year=2016 |isbn=978-989-758-167-0 |pages=74–84 |doi=10.5220/0005684400740084}}
=[http://www.icissp.org/?y=2015 ICISSP 2015] – ESEO, Angers, Loire Valley, France=
Proceedings of the 1st International Conference on Information Systems Security and Privacy . {{ISBN|978-989-758-081-9}} {{cite web|title=ICISSP 2015 dblp information|url=http://dblp.uni-trier.de/search?q=ICISSP+2015}}
Best Paper Award - Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frincu and Viktor Prasanna. "Model-driven Privacy Assessment in the Smart Grid"{{cite book |year=2015 |isbn=978-989-758-081-9 |pages=173–181 |citeseerx=10.1.1.590.5685 |doi=10.5220/0005229601730181 |chapter=Model-driven Privacy Assessment in the Smart Grid |title=Proceedings of the 1st International Conference on Information Systems Security and Privacy }}{{cite book |url=https://www.computer.org/csdl/proceedings/icissp/2015/135/00/07509952-abs.html |title=Model-driven privacy assessment in the smart grid |date=February 2015 |publisher=IEEE Computer Society |isbn=9781467384056 |pages=1–9}}
Best Student Paper Award - Carsten Büttner and Sorin A. Huss. "A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks"{{cite book |year=2015 |isbn=978-989-758-081-9 |pages=259–269 |doi=10.5220/0005238902590269 |chapter=A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks |title=Proceedings of the 1st International Conference on Information Systems Security and Privacy }}
References
{{Reflist}}
External links
- [http://www.icissp.org Conference website]
- [http://www.scitepress.org/DigitalLibrary/ProceedingsList.aspx?FieldName=NX8zK3c48nE=&t=1&title=7+mgmp501Xk=&t=1&conference=T4X9j/tlfeU=&t=1&year=7+mgmp501Xk=&t=1&isbn=7+mgmp501Xk=&t=1 ICISSP Publications]
- [http://www.wikicfp.com/cfp/servlet/tool.search?q=ICISSP&year=a WikiCfp call for papers]
{{Authority control}}
Category:Information systems conferences