International Conference on Information Systems Security and Privacy

The International Conference on Information Systems Security and PrivacyICISSP – aims to create a meeting point for practitioners and researchers interested in security and privacy challenges that concern information systems covering technological and social issues.

The format of the conference counts on technical sessions, poster sessions, tutorials, doctoral consortiums, panels, industrial tracks and keynote lectures. The papers presented in the conference are made available at the SCITEPRESS digital library, published in the conference proceedings and some of the best papers are invited to a post-publication with Springer,[1] in a CCIS Series book.

ICISSP also counts on keynote talks. Some of the invited speakers announced in the previous editions of the conference were: Ross J. Anderson (University of Cambridge, UK), Elisa Bertino (Purdue University, USA), Bart Preneel (KU Leuven, Belgium), Jason Hong (Carnegie Mellon University, USA) and Steven Furnell (University of Plymouth, UK).

Conference topics

edit

Editions and proceedings

edit

ICISSP 2020 – Valletta, Malta

edit

Proceedings of the 6th International Conference on Information Systems Security and Privacy. ISBN 978-989-758-359-9 [2]

ICISSP 2019 – Prague, Czech Republic

edit

Proceedings of the 5th International Conference on Information Systems Security and Privacy. ISBN 978-989-758-081-9 [3]

Best Paper Award – Dayana Spagnuelo, Ana Ferreira and Gabriele Lenzini, “Accomplishing Transparency within the General Data Protection Regulation” [4]

Best Student Paper Award - Maja Nyman and Christine Große, “Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management” [5]

ICISSP 2018 – Funchal, Madeira, Portugal

edit

Proceedings of the 4th International Conference on Information Systems Security and Privacy. ISBN 978-989-758-282-0 [6]

Best Paper Award – Wei-Han Lee, Jorge Ortiz, Bongjun Ko and Ruby Lee, “Inferring Smartphone Users’ Handwritten Patterns by using Motion Sensors” [7]

Best Student Paper Award - Vincent Haupert and Tilo Müller, “On App-based Matrix Code Authentication in Online Banking” [8]

ICISSP 2017 – Porto, Portugal

edit

Proceedings of the 3rd International Conference on Information Systems Security and Privacy. ISBN 978-989-758-209-7 [9]

Best Paper Award – Lake Bu and Mark G. Karpovsky, “A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices” [10]

Best Student Paper Award - Iman Sedeeq, Frans Coenen and Alexei Lisitsa, “Attribute Permutation Steganography Detection using Attribute Position Changes Count” [11]

ICISSP 2016 – Rome, Italy

edit

Proceedings of the 2nd International Conference on Information Systems Security and Privacy. ISBN 978-989-758-167-0 [12]

Best Paper AwardChristoph Kerschbaumer, Sid Stamm and Stefan Brunthaler. “Injecting CSP for Fun and Security” [13]

Best Student Paper Award - Kexin Qiao, Lei Hu and Siwei Sun, “Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques” [14]

ICISSP 2015 – ESEO, Angers, Loire Valley, France

edit

Proceedings of the 1st International Conference on Information Systems Security and Privacy . ISBN 978-989-758-081-9 [15]

Best Paper Award - Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frincu and Viktor Prasanna. "Model-driven Privacy Assessment in the Smart Grid"[16][17]

Best Student Paper Award - Carsten Büttner and Sorin A. Huss. "A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks"[18]

References

edit
  1. ^ Camp, Olivier; Weippl, Edgar; Bidan, Christophe; Aïmeur, Esma (2015-12-31). Information Systems Security and Privacy: First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers. Springer. ISBN 9783319276687.
  2. ^ "Proceedings of the 6th International Conference on Information Systems Security and Privacy".
  3. ^ "Proceedings of the 5th International Conference on Information Systems Security and Privacy".
  4. ^ Lenzini, Gabriele; Ferreira, Ana; Spagnuelo, Dayana (2019). "Accomplishing Transparency within the General Data Protection Regulation". Proceedings of the 5th International Conference on Information Systems Security and Privacy. pp. 114–125. doi:10.5220/0007366501140125. ISBN 978-989-758-359-9.
  5. ^ Große, Christine; Nyman, Maja (2019). "Are You Ready when It Counts? IT Consulting Firm's Information Security Incident Management". Proceedings of the 5th International Conference on Information Systems Security and Privacy. pp. 26–37. doi:10.5220/0007247500260037. ISBN 978-989-758-359-9.
  6. ^ "Proceedings of the 4th International Conference on Information Systems Security and Privacy".
  7. ^ Lee, Ruby; Ko, Bongjun; Ortiz, Jorge; Lee, Wei-Han (2018). "Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors". Proceedings of the 4th International Conference on Information Systems Security and Privacy. pp. 139–148. doi:10.5220/0006650301390148. ISBN 978-989-758-282-0.
  8. ^ Müller, Tilo; Haupert, Vincent (2018). "On App-based Matrix Code Authentication in Online Banking". Proceedings of the 4th International Conference on Information Systems Security and Privacy. pp. 149–160. doi:10.5220/0006650501490160. ISBN 978-989-758-282-0.
  9. ^ "Proceedings of the 3rd International Conference on Information Systems Security and Privacy".
  10. ^ g. Karpovsky, Mark; Bu, Lake (2017). "A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices". Proceedings of the 3rd International Conference on Information Systems Security and Privacy. pp. 233–242. doi:10.5220/0006270502330242. ISBN 978-989-758-209-7.
  11. ^ Lisitsa, Alexei; Coenen, Frans; Sedeeq, Iman (2017). "Attribute Permutation Steganography Detection using Attribute Position Changes Count". Proceedings of the 3rd International Conference on Information Systems Security and Privacy. pp. 95–100. doi:10.5220/0006166400950100. ISBN 978-989-758-209-7. S2CID 6224450.
  12. ^ "ICISSP 2016 dblp information".
  13. ^ Brunthaler, Stefan; Stamm, Sid; Kerschbaumer, Christoph (2016). "Injecting CSP for Fun and Security". Proceedings of the 2nd International Conference on Information Systems Security and Privacy (PDF). pp. 15–25. doi:10.5220/0005650100150025. ISBN 978-989-758-167-0.
  14. ^ Sun, Siwei; Hu, Lei; Qiao, Kexin (2016). "Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques". Proceedings of the 2nd International Conference on Information Systems Security and Privacy. pp. 74–84. doi:10.5220/0005684400740084. ISBN 978-989-758-167-0.
  15. ^ "ICISSP 2015 dblp information".
  16. ^ "Model-driven Privacy Assessment in the Smart Grid". Proceedings of the 1st International Conference on Information Systems Security and Privacy. 2015. pp. 173–181. CiteSeerX 10.1.1.590.5685. doi:10.5220/0005229601730181. ISBN 978-989-758-081-9.
  17. ^ Model-driven privacy assessment in the smart grid. IEEE Computer Society. February 2015. pp. 1–9. ISBN 9781467384056.
  18. ^ "A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks". Proceedings of the 1st International Conference on Information Systems Security and Privacy. 2015. pp. 259–269. doi:10.5220/0005238902590269. ISBN 978-989-758-081-9.
edit