The International Conference on Information Systems Security and Privacy – ICISSP – aims to create a meeting point for practitioners and researchers interested in
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
and
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
challenges that concern
information systems
An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information. From a sociotechnical perspective, information systems are composed by four components: task, people ...
covering technological and social issues.
The format of the conference counts on technical sessions,
poster session
A poster presentation, at a congress or conference with an academic or professional focus, is the presentation of research information in the form of a paper poster that conference participants may view. A poster session is an event at which man ...
s,
tutorials
A tutorial, in education, is a method of transferring knowledge and may be used as a part of a learning process. More interactive and specific than a book or a lecture, a tutorial seeks to teach by example and supply the information to complete ...
, doctoral consortiums, panels, industrial tracks and keynote lectures. The papers presented in the conference are made available at the SCITEPRESS
digital library
A digital library, also called an online library, an internet library, a digital repository, or a digital collection is an online database of digital objects that can include text, still images, audio, video, digital documents, or other digital ...
, published in the conference
proceedings
In academia and librarianship, conference proceedings is a collection of academic papers published in the context of an academic conference or workshop. Conference proceedings typically contain the contributions made by researchers at the confer ...
and some of the best papers are invited to a post-publication with
Springer
Springer or springers may refer to:
Publishers
* Springer Science+Business Media, aka Springer International Publishing, a worldwide publishing group founded in 1842 in Germany formerly known as Springer-Verlag.
** Springer Nature, a multinationa ...
, in
CCIS Series book
ICISSP also counts on keynote talks. Some of the invited speakers announced in the previous editions of the conference were:
Ross J. Anderson
Ross John Anderson (born 15 September 1956) is a researcher, author, and industry consultant in security engineering. He is Professor of Security Engineering at the Department of Computer Science and Technology, University of Cambridge where ...
(
University of Cambridge
, mottoeng = Literal: From here, light and sacred draughts.
Non literal: From this place, we gain enlightenment and precious knowledge.
, established =
, other_name = The Chancellor, Masters and Schola ...
, UK),
Elisa Bertino
Elisa Bertino is a professor of computer science at Purdue University and is acting as the research director of CERIAS, the Center for Education and Research in Information Assurance and Security, an institute attached to Purdue University. Berti ...
(
Purdue University
Purdue University is a public land-grant research university in West Lafayette, Indiana, and the flagship campus of the Purdue University system. The university was founded in 1869 after Lafayette businessman John Purdue donated land and ...
, USA),
Bart Preneel
Bart Preneel (born 15 October 1963 in Leuven, Belgium) is a Flemish cryptographer and cryptanalyst. He is a professor at Katholieke Universiteit Leuven, in the COSIC group.
He was the president of the International Association for Cryptologic ...
(
KU Leuven
KU Leuven (or Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Belgium. It conducts teaching, research, and services in computer science, engineering, natural sciences, theology, humanities, medicine, l ...
, Belgium), Jason Hong (
Carnegie Mellon University
Carnegie Mellon University (CMU) is a private research university in Pittsburgh, Pennsylvania. One of its predecessors was established in 1900 by Andrew Carnegie as the Carnegie Technical Schools; it became the Carnegie Institute of Technology ...
, USA) and Steven Furnell (
University of Plymouth
The University of Plymouth is a public research university based predominantly in Plymouth, England, where the main campus is located, but the university has campuses and affiliated colleges across South West England. With students, it is the ...
, UK).
Conference topics
* Access and Usage Control
*
Risk
In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
and
Reputation Management
Reputation management, originally a public relations term, refers to the influencing, controlling, enhancing, or concealing of an individual's or group's reputation. The growth of the internet and social media led to growth of reputation managem ...
* Security and Privacy in Cloud and
Pervasive Computing
Ubiquitous computing (or "ubicomp") is a concept in software engineering, hardware engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using ...
* Authentication, Privacy and Security Models
* Security Architecture and Design Analysis
*
Security Awareness
Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization. Many organizations require formal security awareness trainin ...
and
Education
Education is a purposeful activity directed at achieving certain aims, such as transmitting knowledge or fostering skills and character traits. These aims may include the development of understanding, rationality, kindness, and honesty. ...
* Security Frameworks, Architectures and Protocols
*
Security Testing
Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing the security testing ...
*
Software Security Assurance
* Threat Awareness
*
Vulnerability Analysis
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally."
A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
and
Countermeasures
A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
*
Information Hiding
In computer science, information hiding is the principle of segregation of the ''design decisions'' in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decisio ...
and
Anonymity
*
Web Application
A web application (or web app) is application software that is accessed using a web browser. Web applications are delivered on the World Wide Web to users with an active network connection.
History
In earlier computing models like client-serve ...
s and Services
*
Biometric
Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify ...
Technologies and Applications
*
Content Protection
Copy protection, also known as content protection, copy prevention and copy restriction, describes measures to enforce copyright by preventing the reproduction of software, films, music, and other media.
Copy protection is most commonly found o ...
and
Digital Rights Management
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted work ...
* Cryptographic Algorithms
*
Data
In the pursuit of knowledge, data (; ) is a collection of discrete values that convey information, describing quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpret ...
and
Software Security
Application security (short AppSec) includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security ...
*
Data Mining and
Knowledge Discovery
Knowledge extraction is the creation of knowledge from structured ( relational databases, XML) and unstructured ( text, documents, images) sources. The resulting knowledge needs to be in a machine-readable and machine-interpretable format and mus ...
*
Database Security
Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated ...
* Identity and
Trust management
*
Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of Confidential Computing. The core id ...
*
Intrusion Detection
An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
and Response
* Legal and Regulatory Issues
*
Malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
Detection
* Mobile Systems Security
* Privacy Metrics and Control
* Privacy, Security and Trust in
Social Media
Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social me ...
* Privacy-Enhancing Models and Technologies
* Security in
IoT
The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other com ...
and
Edge Computing
*
Distributed Ledger
A distributed ledger (also called a shared ledger or distributed ledger technology or DLT) is the consensus of replicated, shared, and synchronized digital data that is geographically spread (distributed) across many sites, countries, or institutio ...
s and
Blockchain
A blockchain is a type of distributed ledger technology (DLT) that consists of growing lists of records, called ''blocks'', that are securely linked together using cryptography. Each block contains a cryptographic hash of the previous block, ...
Technologies and Applications
*
AI and
Machine Learning
Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence.
Machine ...
for Security
Editions and proceedings
ICISSP 2020
– Valletta, Malta
Proceedings of the 6th International Conference on Information Systems Security and Privacy.
ICISSP 2019
– Prague, Czech Republic
Proceedings of the 5th International Conference on Information Systems Security and Privacy.
''Best Paper Award'' – Dayana Spagnuelo, Ana Ferreira and Gabriele Lenzini, “Accomplishing Transparency within the General Data Protection Regulation”
''Best Student Paper Award'' - Maja Nyman and Christine Große, “Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management”
ICISSP 2018
– Funchal, Madeira, Portugal
Proceedings of the 4th International Conference on Information Systems Security and Privacy.
''Best Paper Award'' – Wei-Han Lee, Jorge Ortiz, Bongjun Ko and Ruby Lee, “Inferring Smartphone Users’ Handwritten Patterns by using Motion Sensors”
''Best Student Paper Award'' - Vincent Haupert and Tilo Müller, “On App-based Matrix Code Authentication in Online Banking”
ICISSP 2017
– Porto, Portugal
Proceedings of the 3rd International Conference on Information Systems Security and Privacy.
''Best Paper Award'' – Lake Bu and Mark G. Karpovsky, “A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices”
''Best Student Paper Award'' - Iman Sedeeq, Frans Coenen and Alexei Lisitsa, “Attribute Permutation Steganography Detection using Attribute Position Changes Count”
ICISSP 2016
– Rome, Italy
Proceedings of the 2nd International Conference on Information Systems Security and Privacy.
''Best Paper Award'' �
Christoph KerschbaumerSid Stammand Stefan Brunthaler. “Injecting CSP for Fun and Security”
''Best Student Paper Award'' - Kexin Qiao, Lei Hu and Siwei Sun, “Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques”
ICISSP 2015
– ESEO, Angers, Loire Valley, France
Proceedings of the 1st International Conference on Information Systems Security and Privacy .
''Best Paper Award'' - Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frincu and Viktor Prasanna. "Model-driven Privacy Assessment in the Smart Grid"
''Best Student Paper Award'' - Carsten Büttner and
Sorin A. Huss. "A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks"
References
External links
Conference website ICISSP PublicationsWikiCfp call for papers
{{Authority control
Information systems conferences
Computer science conferences
Academic conferences