5th International Conference on Information Systems Security (ICISS 2009)
14-18 December 2009
Kolkata, India



The conference series ICISS (International Conference on Information
Systems Security), held annually, provides a forum for disseminating
the latest research results in information and systems security.  The
acceptance ratio of the first four conferences has averaged less than
30%, and the proceedings have been published as part of the Springer
Verlag series of Lecture Notes in Computer Science. The ICISS 2009
encourages submissions addressing theoretical and practical problems
in information and systems security and related areas. We especially
like to encourage papers in domains that have not been represented
much in the past at the conference, such as database security/privacy,
usability aspects of security, operating systems security, and sensor
networks security. Papers that introduce and address unique security
challenges or present thought-provoking ideas are also welcome. For
details please refer to conference website at:

Important Dates
Manuscript Submission (Full Paper): 15 July 2009
Tutorial Proposal Submission: 03 August 2009
Notification of Acceptance: 04th Sep 2009
Submission of Camera-Ready Manuscript: 21 Sep 2009

Paper Submission

Submissions must be made to the submission web site. Papers should be
formatted as they would appear in the final LNCS proceedings. Papers
should be at most 15 pages in length, including the bibliography. One
of the authors of an accepted paper must attend the conference to
present the paper. Conference papers will be presented between
Dec. 16th and 18th, 2009. ICISS accepts only electronic submissions in
PDF format. Note that our publisher, Springer LNCS series, strongly
prefers camera-ready manuscripts to be submitted in LaTeX2e (or LaTeX)
format using the llncs.cls LaTeX template provided by Springer
Verlag. See detailed manuscript preparation instructions and options
at Information for LNCS Authors.
Dual Submission Policy: Submitted papers must not substantially
overlap with papers published or currently submitted to a journal or a
conference with proceedings.
Proceedings: Conference Proceedings will be published in the Springer
LNCS series.
Poster/Demo Session

There will be a poster/demo session for
researchers to present new ideas and latest preliminary
research. Ideas that provoke, intrigue, or inspire information
security audience are specially encouraged. These can be submitted
closer to the conference date. The submission can be just a poster,
just a demo, or a combination of the two. Further details on
submission deadlines to be provided later.  Contact Poster/Demo
Session Chair: Prof. Raja Datta: rajadatta at ece.iitkgp.ernet.in.
Tutorial Proposals

There will be tutorial program for two days (14-15 December 2009). At
most four three-hour tutorials will be offered.  Proposals are invited
for tutorials of duration three hours on relevant topics of current
interest. A tutorial proposal should include the extended abstract of
the tutorial and a brief biography of the speaker(s). Please mail your
proposal to A.K. Pujari or Indrakshi Ray (reachable via
iciss09-tutorials at umich.edu) by 3rd Aug 2009. The speaker(s) of the
accepted proposals need to submit their final presentation one month
before the conference to the Tutorial Chairs.

Conference Website: http://www.eecs.umich.edu/iciss09/