Stratégies Télécoms & Multimédia

English
  • Accueil
  • Newsletter
  • Plan du site
  • Contact
  • Accueil
  • Services
  • Evénements
  • Webzine
  • Editorial
  • Actualités
  • Magazine
  • Dossiers
  • Agenda
  • Encyclopédie des Télécoms
  • Abonnement à la Newsletter
WOSIS - Workshop on Security In Information Systems
Augmenter la taille de la police Diminuer la taille de la police Imprimer Envoyer à un ami Flux RSS

Pour envoyer cette page,
remplissez les champs ci-dessous et cliquez sur le bouton "OK"...

Nom : Votre message :
Votre adresse email* :
Adresse email du destinataire* :
Annuler   Envoyer
(*) Champs obligatoires Fermer
Du 28 Juin au 1er Juillet 2012 à Wroclaw, Pologne
4 mars 2012 - Agenda
Information Systems Security is one of the most pressing challenges facing all kinds of organizations today. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to be effective in maintaining their information secure, avoiding unauthorized access, preventing intrusions, stopping secret information disclosure, etc
There are various definitions of security, but all of them basically agree on the same components. Security in information systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment and business opportunities.

Security is, therefore, currently a widespread and growing concern that covers all areas of society : business, domestic, financial, government, and so on. In fact, the so-called information society is increasingly dependent on a wide range of software systems whose mission is critical, such as air traffic control systems, financial systems, or public health systems. The potential losses that are faced by businesses and organizations that rely on all these systems, both hardware and software, therefore signify that it is crucial for information systems to be properly secured from the outset.

With the increasing dependence that the information society has on Information and Communication Technology (ICT), the need to protect information is increasingly important for companies. The demand for products, systems and services with which to manage and maintain information is therefore increasing, and the realization of superficial security controls is not sufficient. It is necessary to apply a rigorous approach to the assessing and improvement of the security of products and processes that take place in the context of ICT. This has led to the emergence of Information Security Management Systems (ISMS), which are of great importance to the stability of companies’ information systems.

In this new edition of WOSIS, the traditional information systems security topics will remain but we want explicitly focus the workshop on one of the most important issues and currently considered as it is security in Cloud computing. Although there are many benefits to adopting cloud computing, there are also some significant barriers to adoption as is security followed by issues regarding compliance, privacy and legal matters. Security is the main obstacle for many organizations in their move to the cloud, related to risk areas such as external data storage, dependency on the “public” internet, multi-tenancy and integration with internal security. The objective of this new edition is to contribute to the study and analysis of solutions and approaches which help to achieve and facilitate the level of security needed for such distributed environments and that its adoption is not any problem for the society, administration and enterprise.

Topics of interest include, but are not limited to :

- Topic for Cloud Computing (Risks and Security)

- Security in Software development Life Cycle

- Information Security Management System

- Security Management and Assessment

- Analysis and management of risks

- Security Implementation, Secure programming and Security Deployment

- Case studies and experiences of secure software

- Security culture

- Security for Mobile Computing, sensors networks, multimedia systems

- Security for Electronic Commerce, Electronic Business and e-Services (e-voting, e-banking, e-governement, e-health)

- Security in Social Networks

- Security for embedded systems, smart cards and RFID

- Security Issues in Ubiquitous/Pervasive Computing

- Intellectual Property Protection

- Digital Rights Management (DRM). Mobile DRM

- Cryptology : Cryptography and Cryptanalysis

- Information hiding : Steganography & Steganalysis

- Digital Forensics

- Cyber terrorism

Contact :

Dr. Luis Enrique Sánchez
Sicaman-NT, Departament of R+D, Spain
 [1]

http://www.iceis.org/wosis.aspx
Abonnement à la Newsletter      Haut de page

 Votre adresse e-Mail : 
S'inscrire Se désinscrire
Inscription libre et sans engagement
Derniers titres - Flux RSS
• Compétition technologique dans le paiement mobile sans contact (NFC Market)
(5 mars 2012 - Magazine)
Le système de paiement sans contact sur les téléphones mobiles stimule de nombreux acteurs. L’objectif de chacun des compétiteurs consiste à doubler (...)
• Claranet, hébergeur certifié
(5 mars 2012 - Actualités)
La société Claranet, spécialisée dans les services Internet pour les entreprises (Infogérance, Hébergement & Réseaux Managés) a réussi avec succès (...)
• Signature électronique en mode PDF
(5 mars 2012 - Actualités)
Une quarantaine de sociétés ont participé en novembre et décembre dernier à la campagne d’essais de compatibilité (PlugTests) relative à la signature (...)
Agenda

Consultez la liste des prochains événements :

FGW - Fourth Generation Wireless , Du 15 au 17 Juin 2012, à Palma de Mallorca, Espagne, This event is intended to (...) ... [suite] SSS 2012 - 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Du 1er au 4 Octobre 2012, à Toronto, Canada, The SSS 2012 Symposium is (...) ... [suite]


Recherche par thème


  • Accueil
  • Services
  • Evénements
  • Webzine
  • Newsletter
  • Plan du site
  • Mentions Légales
  • Contact