CALL FOR PAPERS - Closed
We would
like to invite all information security professionals and academics to
share their knowledge and experience with the local South African
information security community by submit a 1-page abstract on any
information security related topic. The abstracts must preferably
be in MS-Word format although PDF and PS will also be
accepted. (Final papers must be in MS-Word or TXT format
to enable us to edit them for the proceedings.) The abstracts will be
evaluated by a programme committee and the best ones will be included in
the programme for presentation.
Due date
for 1-page abstracts: 30 March 2002
Notification:
15 April 2002
Full
article due: 31 May 2002 (±10-12 pages)
Conference: 10-12 July 2002
All accepted articles will be published in the official conference proceeding.
Based on the feedback forms received for ISSA2001, there is a huge need for
information sharing in the information security industry. One of the
criticisms was that there were not enough papers presented by industry
professionals. We would therefore like to urge you to take part and
contribute to the information security community by submitting an abstract.
Topics
include but are not limited to:
-
Access
Control
-
Architectures and infrastructures
-
Authentication
-
Anti-Virus
-
Backup,
Storage, Recovery
-
Biometrics
-
Certification
-
Challenges and solutions
of managing security
-
Communications
/ network security
-
Content
Security
-
Corporate
governance / Enterprise security
-
CRM
security
-
Digital
Id, Authentication
-
Disaster
Recovery Planning and Management
-
E-Commerce
security
-
E-mail
security
-
Encryption
-
Evaluation
of Information Security in companies and information security surveys
-
Firewalls
-
Forensic
Auditing
-
Future
visions for Information Security Management
-
Hacking on
the Internet
-
Intelligent tokens
-
Intruder
Detection
-
Legal,
ethical and social issues related to Information Security
-
Legislation
-
Methodologies
for securing small to medium size enterprises
-
Methodologies
and techniques for certification and accreditation
-
Mobile
Computing
-
Networking
Security
-
PKI
-
Practical
industry presentations on managing information security
-
Practical
industry presentations on applications such as PGP
-
Printers,
Id Systems
-
Risk
Management
-
Secure
servers
-
Security
Policy
-
Small distribution applications
-
Smart
Cards
-
Standards
- Local & International
-
VPNs
- Vulnerability Assessments
We are looking
for the following kinds of contributions:
1. Articles
2. Case
studies
3. Lessons
learned
4. Current
research
5. Short
tutorials
6. Research in progress (student papers)
If you have
any queries, worries or just need general advice on how to go about writing an
article, please feel free to contact us.
Les
Labuschagne or Jan
Eloff
TEMPLATES
You can
download the following templates for submitting an article:
MS-Word
(KAPproc_word8.dot - template file) Preferred
[This file contains Macros! It has been
virus checked before being put on the server but please do so again before
using.]
LATEX
(procLATEX.zip - template files)
|