Call for Papers ----------------------------------------------------------------- 2nd International Workshop on Secure Information Systems (SIS'07) October 15-17, 2007, Wisla, Poland http://www.imcsit.org/ ----------------------------------------------------------------- The 2nd International Workshop on Secure Information Systems (SIS'07) will be held in Wisla, Poland on October 15-17, 2007, in conjunction with the International Multiconference on Computer Science and Information Technology. The conference and the workshop are organized in cooperation with the Poland Chapter of the IEEE Computer Society and with the Systems Research Institute of the Polish Academy of Science. The SIS workshop is envisioned as a forum to promote the exchange of ideas and results addressing complex security issues that arise in modern information systems. We aim at bringing together a community of security researchers and practitioners working in such divers areas as networking security, antivirus protection, intrusion detection, cryptography, security protocols, and others. We would like to promote an integrated view at the security of information systems. As information systems evolve, becoming more complex and ubiquitous, issues relating to security, privacy and dependability become more critical. At the same time, the global and distributed character of modern computing - typically involving interconnected heterogeneous execution environments - introduces many new and challenging engineering and scientific problems. Providing protection against increasingly sophisticated attacks requires strengthening the interaction between different security communities, e.g. antivirus and networking. New technologies lead to the emergence of new threats and attack strategies, involving smart mobile devices, peer-to-peer networks, instant messaging, VoIP, mesh networks or even networked consumer devices, such as house appliances or cars. Furthermore, the increasing openness of the communications infrastructure results in novel threats and can jeopardize critical enterprise and public infrastructure, such as industrial automation and process control systems. Not only it is estimated that half of all Web applications and Internet storefronts still contain some security vulnerabilities, but secure commerce applications are also exposed to increasingly elaborate attacks, including spyware, phishing and other social engineering methods. In order to develop a secure system, security has to be considered in all phases of the lifecycle and adequately addressed in all layers of the system. At the same time, good engineering has to take into account both scientific and economic aspects of every solution: the cost of security has to be carefully measured against its benefits - in particular the expected cost of mitigated risks. Most companies and individuals treat security measures in information system as a necessary, but often uncomfortable, overhead. The increasing penetration of computing in all domains of everyday life means that security of critical business systems is often managed and maintained by personnel who are not knowledgeable in the field. This highlights the importance of usability and ease of configuration of security mechanism and protocols. Covered topics include (but are not limited to): * Access control * Adaptive security * Copyright protection * Cryptography * Cyberforensics * Digital Rights Management * Honeypots * Intrusion detection * Network security * Privacy * Secure commerce * Security exploits * Security policies * Security protocols * Security services * Security evaluation and prediction * Software protection * Trusted computing * Threat modeling * Usability and security * Viruses and worms * Zero-configuration security mechanisms PAPER SUBMISSION AND PUBLICATION Paper will be refereed and accepted on the basis of their scientific merit and the relevance to the workshop. Accepted and presented papers will be included into the Conference Proceedings and published on a CD (ISSN 1896-7094). Extended versions of selected papers will be published in an international journal (to be announced). Authors should submit draft papers (as Postscript, PDF of MSWord file). Their total length should not exceed 10 pages of (LNCS style). While preparing your papers, please use templates available at the correspondent WWW site (http://www.imcsit.org/). DATES Submission of Papers: June 25, 2007 Notification of Acceptance: August 6, 2007 Camera-Ready Papers: September 7, 2007 Conference: October 15-17, 2007 WORKSHOP CHAIRS: Konrad Wrona, SAP Research, France Krzysztof Szczypiorski, Warsaw University of Technology, Poland PROGRAM COMMITTEE: Sergey Bratus, Dartmouth College, USA Nicolas T. Courtois, University College of London, UK Lech J. Janczewski, University of Auckland, New Zealand Silke Holtmans, Nokia Research, Finland Kamil Kulesza, IFTR PAS, Poland and University of Cambridge, UK Miroslaw Kutylowski, Wroclaw University of Technology, Poland Josef Pieprzyk, Macquarie University, Australia Sugata Sanyal, Tata Institute of Fundamental Research Andreas Schaad, SAP Research, Germany Janusz Stoklosa, Poznan University of Technology, Poland Osamu Takata, Hitachi Europe Ltd., UK Johnson Thomas, Oklahoma State University, USA Thomas Walter, DoCoMo Labs Europe, Germany