Call for Papers

2nd International Workshop on Secure Information Systems (SIS'07)
October 15-17, 2007, Wisla, Poland

The 2nd International Workshop on Secure Information Systems (SIS'07) 
will be held in Wisla, Poland on October 15-17, 2007, in conjunction 
with the International Multiconference on Computer Science and 
Information Technology.

The conference and the workshop are organized in cooperation with the 
Poland Chapter of the IEEE Computer Society and with the Systems 
Research Institute of the Polish Academy of Science.

The SIS workshop is envisioned as a forum to promote the exchange of 
ideas and results addressing complex security issues that arise in 
modern information systems. We aim at bringing together a community of 
security researchers and practitioners working in such divers areas as 
networking security, antivirus protection, intrusion detection, 
cryptography, security protocols, and others. We would like to promote 
an integrated view at the security of information systems.

As information systems evolve, becoming more complex and ubiquitous, 
issues relating to security, privacy and dependability become more 
critical. At the same time, the global and distributed character of 
modern computing - typically involving interconnected heterogeneous 
execution environments - introduces many new and challenging engineering 
and scientific problems. Providing protection against increasingly 
sophisticated attacks requires strengthening the interaction between 
different security communities, e.g. antivirus and networking. New 
technologies lead to the emergence of new threats and attack strategies, 
involving smart mobile devices, peer-to-peer networks, instant 
messaging, VoIP, mesh networks or even networked consumer devices, such 
as house appliances or cars. Furthermore, the increasing openness of the 
communications infrastructure results in novel threats and can 
jeopardize critical enterprise and public infrastructure, such as 
industrial automation and process control systems. Not only it is 
estimated that half of all Web applications and Internet storefronts 
still contain some security vulnerabilities, but secure commerce 
applications are also exposed to increasingly elaborate attacks, 
including spyware, phishing and other social engineering methods.

In order to develop a secure system, security has to be considered in 
all phases of the lifecycle and adequately addressed in all layers of 
the system. At the same time, good engineering has to take into account 
both scientific and economic aspects of every solution: the cost of 
security has to be carefully measured against its benefits - in 
particular the expected cost of mitigated risks. Most companies and 
individuals treat security measures in information system as a 
necessary, but often uncomfortable, overhead. The increasing penetration 
of computing in all domains of everyday life means that security of 
critical business systems is often managed and maintained by personnel 
who are not knowledgeable in the field. This highlights the importance 
of usability and ease of configuration of security mechanism and protocols.

Covered topics include (but are not limited to):

* Access control
* Adaptive security
* Copyright protection
* Cryptography
* Cyberforensics
* Digital Rights Management
* Honeypots
* Intrusion detection
* Network security
* Privacy
* Secure commerce
* Security exploits
* Security policies
* Security protocols
* Security services
* Security evaluation and prediction
* Software protection
* Trusted computing
* Threat modeling
* Usability and security
* Viruses and worms
* Zero-configuration security mechanisms


Paper will be refereed and accepted on the basis of their scientific 
merit and the relevance to the workshop.

Accepted and presented papers will be included into the Conference 
Proceedings and published on a CD (ISSN 1896-7094).

Extended versions of selected papers will be published in an 
international journal (to be announced).

Authors should submit draft papers (as Postscript, PDF of MSWord file).

Their total length should not exceed 10 pages of (LNCS style). While 
preparing your papers, please use templates available at the 
correspondent WWW site (


Submission of Papers:           June 25, 2007
Notification of Acceptance:     August 6, 2007
Camera-Ready Papers:            September 7, 2007
Conference:                     October 15-17, 2007


Konrad Wrona, SAP Research, France
Krzysztof Szczypiorski, Warsaw University of Technology, Poland


Sergey Bratus, Dartmouth College, USA
Nicolas T. Courtois, University College of London, UK
Lech J. Janczewski, University of Auckland, New Zealand
Silke Holtmans, Nokia Research, Finland
Kamil Kulesza, IFTR PAS, Poland and University of Cambridge, UK
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Josef Pieprzyk,  Macquarie University, Australia
Sugata Sanyal, Tata Institute of Fundamental Research
Andreas Schaad, SAP Research, Germany
Janusz Stoklosa, Poznan University of Technology, Poland
Osamu Takata,  Hitachi Europe Ltd., UK
Johnson Thomas, Oklahoma State University, USA
Thomas Walter, DoCoMo Labs Europe, Germany