Extract from CFP which follows:

> The main objective of this technical session on Enterprise Information
> Security is to bring together academics, industry and researchers to 
> propose
> and examine practical and timely ways Information Systems application
> developers can "easily" incorporate security into commercial 
> application
> software which often has to be deployed into an enterprise information
> system AND  meet the objectives of an organizational security 
> management
> program.

Begin forwarded message:

> From: ...
> CFP - Addressing Enterprise Information Security - SAM 2005 - Las Vegas
>
> Colleagues - I was asked to forward this to my CSIA colleagues. Dianne
>
>
> Dear Colleagues,
> Could you please distribute the following CFP request at your
> institution/organisation and/or contact prospective authors for this 
> topical
> area of security for Information Systems practictioners.
>
> Thanks in advance for your cooperation.
> *--------------------------- CUT HERE
> *-------------------------------------------------------------
>                  Call For Papers
>                       Special Session on
>            Addressing Enterprise Information Security
>
>          A session in the 2005 International Conference on Security and
> Management;
> SAM'05 http://www.world-academy-of-science.org/WCAC2005/ws/SAM
>                  June 20-23, 2005 , Las Vegas, USA
>                                      part of:
>                                      The 2005 World Congress in Applied
>                                      Computing (WCAC'05; The world's 
> largest
> gathering of researchers in computer science, computer engineering and
> applied computing will be held in June 2005.
> http://www.world-academy-of-science.org)
>
>
> The main objective of this technical session on Enterprise Information
> Security is to bring together academics, industry and researchers to 
> propose
> and examine practical and timely ways Information Systems application
> developers can "easily" incorporate security into commercial 
> application
> software which often has to be deployed into an enterprise information
> system AND  meet the objectives of an organizational security 
> management
> program.
>
> Chair of Session: Dr. Anthony Rhodes
>                   Zayed University, Dubai, United Arab Emirates (UAE)
>                   [EMAIL PROTECTED]
>
> Topics include, but are not restricted to:
> Security Management,
> Enterprise Information Security,
> Best Security Practices and Standards,
> Security Metrics,
> Security Self Assessment,
> Security Education and Training, including Tertiary IT security 
> programs,
> Risk Management,
> Security Guidelines,
> Secure Commercial IT Systems,
> Outsourcing Security,
> Information Assurance,
> Cybersecurity,
> Security and the Systems Development Life Cycle,
> e-commerce/e-business security
>
>
> Deadlines:
>                   Feb.  20, 2005:    Submission of papers
>                                      Papers must be submitted to:
>                                      [EMAIL PROTECTED]
>                   March 21, 2005:    Notification of acceptance
>                   April 20, 2005:    Camera-Ready papers & Prereg. due
>                   June 20-23, 2005:  SAM'05 International Conference
>
> For any questions, please contact  the  session chair using the 
> following
> details:
>
> Chair Email: [EMAIL PROTECTED]
> Phone: +971 4 2082 188
> Fax: +971 4 2082 655
>
> SUBMISSION OF PAPERS:
>    Please regard this as General Guidelines.
>    Prospective authors are invited to submit their
>    papers (about 5 to 10 pages - single space, font size of 10 to 12)
>    to A. W. Rhodes by February 20. E-mail submissions in
>    MS document or PDF formats are preferable (Fax or postal
>    submissions are also acceptable.)
>
>    The length of the Camera-Ready papers (if accepted) will
>    be limited to 7 (IEEE style) double-column pages.  Papers must
>    not have been previously published or currently submitted for
>    publication elsewhere.  The first page of the paper
>    should include: title of the paper, name, affiliation,
>    postal address, E-mail address, telephone number, &
>    Fax number for each author.  The first page should also
>    include the name of the author who will be presenting
>    the paper (if accepted) and a maximum of 5 keywords.
>    Also, the name of the conference that the paper is being
>    submitted to must be mentioned on the first page.
>
>    Papers will be evaluated and fully refereed for originality,
>    significance, clarity, and soundness.  Each paper will be
>    refereed by two researchers in the topical area.
>    The Camera-Ready papers will be reviewed by one person.
>
> LOCATION OF CONFERENCES:
>    The conferences will be held in the Monte Carlo Resort
>    hotel, Las Vegas, Nevada, USA (with any overflows at other
>    near-by hotels).  The Monte Carlo Resort is a mega hotel
>    with excellent conference facilities and over 3,000 rooms.
>    The hotel is minutes from the airport with 24-hour
>    shuttle service to and from the airport.  This hotel has
>    many recreational attractions, including: waterfalls,
>    spa, pools & kiddie pools, sunning decks, Easy River
>    water ride, wave pool with cascades, lighted tennis
>    courts, health spa (with workout equipment, whirlpool,
>    sauna, ...), arcade virtual reality game rooms, nightly
>    shows, snack bars, a number of restaurants, shopping area,
>    bars, ...  Many of these attractions are open 24 hours a
>    day & most are suitable for families & children.  The
>    negotiated room rate for conference attendees is very
>    reasonable.  The hotel is within walking distance from
>    most other attractions (major shopping areas, recreational
>    destinations, fine dining & night clubs, free street
>    shows, ...).
>
>
> SAM05 is part of the 2005 World Congress in Applied Computing is 
> composed of
> the following 14 conferences (all will be held simultaneously, same 
> location
> and  dates June 20-23, 2005, Las Vegas, USA):
> 1.  The 2005 International Conference on Grid Computing
>     and Applications (GCA'05)
>
> 2.  The 2005 International Conference on e-Business,
>     Enterprise Information Systems, e-Government, and
>     Outsourcing (EEE'05)
>
> 3.  The 2005 International Conference on Biometric
>     Authentication (BIOAU'05)
>
> 4.  The 2005 International Conference on Computers for
>     People with Special Needs (CPSN'05)
>
> 5.  The 2005 International Conference on Data Mining
>     (DMIN'05)
>
> 6.  The 2005 International Conference on Human-Computer
>     Interaction (HCI'05)
>
> 7.  The 2005 International Conference on Computer Vision
>     (VISION'05)
>
> 8.  The 2005 International Conference on Scientific
>     Computing (CSC'05)
>
> 9.  The 2005 International Conference on Information and
>     Knowledge Engineering (IKE'05)
>
> 10. The 2005 International Conference on Security and
>     Management (SAM'05)
>
> 11. The 2005 International Conference on Mathematics and
>     Engineering Techniques in Medicine and Biological
>     Sciences (METMBS'05)
>
> 12. The 2005 International Conference on Algorithmic
>     Mathematics and Computer Science (AMCS'05)
>
> 13. The 2005 International Conference on Data Fusion -
>     From Multi-Source Data to Information (FUS'05)
>
> 14. The 2005 International Conference on Frontiers in
>     Education: Computer Science and Computer Engineering
>     (FECS'05)
>
> a link to each conference's URL can be found at
> http://www.world-academy-of-science.org
>
>
>
> kind regards
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Dr Anthony (Tony) RHODES             e-mail:  [EMAIL PROTECTED]
> Associate Professor and Assistant Dean,
> College of Information Systems
> Zayed University
> PO Box 19282
> Dubai, UAE
> Ph: 9714 2082188
> Mob: 97150 6250992
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Follow the pace of nature, her secret is patience
> Proper Preparation Prevents Poor Performance.
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Reply via email to