In order to achieve a sufficient information security level, ICT risks should be well identified, prioritized and mastered by efficient procedural and technical security measures.
A risk management process has to consider all risk components in order to choose, or to propose, the most appropriate countermeasures. Being concerned by the costs that countermeasures generate, everyone has to perform a cost-benefits analysis in order to spend less resource but obtain appropriate results. In the same time, risk management methodologies exist but are not enough if there cannot be sustained by effective security management approaches and solutions.
This workshop addresses a wide range of issues related to risk and security managerial and technical issues. This workshop wishes to further stimulate the interdisciplinary approach to effective information and network security solutions, for citizen, organizations and states, through rigorous risk analysis and security management approaches.
This workshop will bring together experts from several disciplines, with different backgrounds and experiences of enhancing the implementation of security adoption in an effective way to enhance business performance and people safety.
Both theoretical studies and reports of experiences are welcomed in this workshop.
Topics should include, but are not limited to:
The session will be advertised by using appropriate mailing lists, newsletters, websites and personal contacts.
Contribution to the field of networking and applications
Networks and applications vulnerabilities are a reality and threats can impact every actor of the information society. So, today in a networked and interconnected world, ICT related risks could not be ignored and should be mastered in an efficient and effective way.
By addressing such issues, this workshop will contribute to raise awareness, to develop and to enforce security by designing applications, distributed systems and computer networks that integrate in native mode, security measures.
|Paper Submission Deadline||October 15, 2010|
|Author Notification||November 1, 2010|
|Author Registration||December 3, 2010|
|Final Manuscript Due||December 3, 2010|
Authors are invited to submit research and application papers following the IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page:
Instruction to Authors
Workshop papers are classified into 1 categorizes representing original, previously unpublished work. Workshop paper (6 pages)
Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition.
Contact author must provide the following information at the AINA web site: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 300 words abstract, and about 8 keywords. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
All accepted papers will be published as ISBN proceedings published by the IEEE Computer Society, and will be available online through IEEE Xplore (EI indexing).
Professor Solange Ghernaouti
University of Lausanne
Faculty of Business and Economics
1015 Lausanne – Switzerland