Workshop on Security In Information Systems (WOSIS-2005)
24-25 May 2005
Miami Beach, Florida, USA

Submission deadline: 25 January 2005

3rd. International Conference
on Computing, Communication and Control Technologies: CCCT '05 will be held
July 24-27, 2005 in Austin, Texas, USA (Silicon Hills), under the auspices
and with the sponsorship of the Center for Lifelong Engineering Education
of The University of Texas at Austin (

Complete details of CCCT '05 on the Conference web-site at: .

The conference's Call for papers in: 

We are emphasizing the area of Security Systems and Systems Securiry,
mainly Computer Security Technologies and Applications.

Participation is through papers or invited sessions.
Invited session organizers have the autonomy in promoting their sessions,
reviewing the papers collected by them, appointing the possible additional
reviewers for the session papers, accepting invited papers or talks (i.e.
non reviewed papers), chairing their respective session(s) and appointing
their co-organizer and/or co-chair.

Form are provided in the conference web page at: 

The best 10% of the papers will be published in SCI Journal
( , the hard copy version of it
will be ready in about one month, and it will be sent to the largest
university libraries.

The workshop is co-located with the International Conference on Enterprise
Information Systems (ICEIS)

Organized by:
Florida International University, in collaboration with INSTICC.


Full Paper Submission: January 25, 2005
Author Notification: March 4, 2005
Final Camera-Ready Submission and Registration: March 18, 2005
Workshop dates: May 24-25, 2005



Topics of interest include, but are not limited to

- Methodologies for the development of security information system
- Access control techniques
- Personal data protection
- Information systems risk management and analysis
- Security in databases, datawarehouses and web information systems
- Secure information systems architectures
- Standards for information systems security
- Metadata for Web and multimedia security
- XML and RDF based metadata for security
- Security Engineering
- Assessment of security software/hardware
- Study, validation and attacks on security protocols
- Real world applications analysis
- Cryptology: Cryptography and Cryptanalysis
- Information hiding: Steganography & Steganalysis
- Peer-to-Peer systems
- Analysis and design of cryptographic algorithms
- Electronic commerce
- Wireless communications
- RFID privacy and security implications
- Anti-Spam techniques
- Open source secure development
- Emission security
- Attacks on copyright marking systems
- Reliability of security systems
- Disaster recovery
- Security of clinical information systems
- Cyberterrorism
- E-Laws and e-government
- PKI technology
- Economics aspects of security
- Electronic Voting
- Computer Forensics
- Incident response
- Privacy and freedom issues
- Privacy-preserving Web-mining
- Legal aspects of cyber security


Please submit your paper via the ICEIS website


All accepted papers will be published in the workshop proceedings with
ISBN, in book and CD-ROM


 ICEIS 2005 Secretariat
 EC 3100
 Department of Industrial & Systems Engineering
 Florida International University
 Miami, FL 33199