CALL FOR PAPERS - Closed

We would like to invite all information security professionals and academics to share their knowledge and experience with the local South African information security community by submit a 1-page abstract on any information security related topic.  The abstracts must preferably be in MS-Word format although PDF and PS will also be accepted.  (Final papers must be in MS-Word or TXT format to enable us to edit them for the proceedings.) The abstracts will be evaluated by a programme committee and the best ones will be included in the programme for presentation.

Due date for 1-page abstracts: 30 March 2002
Notification: 15 April 2002
Full article due: 31 May 2002  (±10-12 pages)
Conference: 10-12 July 2002

All accepted articles will be published in the official conference proceeding.
 

Based on the feedback forms received for ISSA2001, there is a huge need for information sharing in the information security industry.  One of the criticisms was that there were not enough papers presented by industry professionals.  We would therefore like to urge you to take part and contribute to the information security community by submitting an abstract.  

Topics include but are not limited to: 

  • Access Control

  • Architectures and infrastructures

  • Authentication

  • Anti-Virus

  • Backup, Storage, Recovery

  • Biometrics

  • Certification

  • Challenges and solutions of managing security

  • Communications / network security

  • Content Security 

  • Corporate governance / Enterprise security

  • CRM security

  • Digital Id, Authentication 

  • Disaster Recovery Planning and Management 

  • E-Commerce security

  • E-mail security

  • Encryption

  • Evaluation of Information Security in companies and information security surveys

  • Firewalls

  • Forensic Auditing 

  • Future visions for Information Security Management

  • Hacking on the Internet

  • Intelligent tokens

  • Intruder Detection

  • Legal, ethical and social issues related to Information Security

  • Legislation 

  • Methodologies for securing small to medium size enterprises

  • Methodologies and techniques for certification and accreditation

  • Mobile Computing

  • Networking Security

  • PKI

  • Practical industry presentations on managing information security

  • Practical industry presentations on applications such as PGP

  • Printers, Id Systems

  • Risk Management

  • Secure servers

  • Security Policy

  • Small distribution applications

  • Smart Cards

  • Standards - Local & International

  • VPNs

  • Vulnerability Assessments
We are looking for the following kinds of contributions:
 
1. Articles
2. Case studies
3. Lessons learned
4. Current research
5. Short tutorials
6. Research in progress (student papers)

If you have any queries, worries or just need general advice on how to go about writing an article, please feel free to contact us.

Les Labuschagne  or  Jan Eloff


TEMPLATES

You can download the following templates for submitting an article:

MS-Word (KAPproc_word8.dot - template file) Preferred
[This file contains Macros!  It has been virus checked before being put on the server but please do so again before using.]

LATEX (procLATEX.zip - template files)