Extract from CFP which follows: > The main objective of this technical session on Enterprise Information > Security is to bring together academics, industry and researchers to > propose > and examine practical and timely ways Information Systems application > developers can "easily" incorporate security into commercial > application > software which often has to be deployed into an enterprise information > system AND meet the objectives of an organizational security > management > program.
Begin forwarded message: > From: ... > CFP - Addressing Enterprise Information Security - SAM 2005 - Las Vegas > > Colleagues - I was asked to forward this to my CSIA colleagues. Dianne > > > Dear Colleagues, > Could you please distribute the following CFP request at your > institution/organisation and/or contact prospective authors for this > topical > area of security for Information Systems practictioners. > > Thanks in advance for your cooperation. > *--------------------------- CUT HERE > *------------------------------------------------------------- > Call For Papers > Special Session on > Addressing Enterprise Information Security > > A session in the 2005 International Conference on Security and > Management; > SAM'05 http://www.world-academy-of-science.org/WCAC2005/ws/SAM > June 20-23, 2005 , Las Vegas, USA > part of: > The 2005 World Congress in Applied > Computing (WCAC'05; The world's > largest > gathering of researchers in computer science, computer engineering and > applied computing will be held in June 2005. > http://www.world-academy-of-science.org) > > > The main objective of this technical session on Enterprise Information > Security is to bring together academics, industry and researchers to > propose > and examine practical and timely ways Information Systems application > developers can "easily" incorporate security into commercial > application > software which often has to be deployed into an enterprise information > system AND meet the objectives of an organizational security > management > program. > > Chair of Session: Dr. Anthony Rhodes > Zayed University, Dubai, United Arab Emirates (UAE) > [EMAIL PROTECTED] > > Topics include, but are not restricted to: > Security Management, > Enterprise Information Security, > Best Security Practices and Standards, > Security Metrics, > Security Self Assessment, > Security Education and Training, including Tertiary IT security > programs, > Risk Management, > Security Guidelines, > Secure Commercial IT Systems, > Outsourcing Security, > Information Assurance, > Cybersecurity, > Security and the Systems Development Life Cycle, > e-commerce/e-business security > > > Deadlines: > Feb. 20, 2005: Submission of papers > Papers must be submitted to: > [EMAIL PROTECTED] > March 21, 2005: Notification of acceptance > April 20, 2005: Camera-Ready papers & Prereg. due > June 20-23, 2005: SAM'05 International Conference > > For any questions, please contact the session chair using the > following > details: > > Chair Email: [EMAIL PROTECTED] > Phone: +971 4 2082 188 > Fax: +971 4 2082 655 > > SUBMISSION OF PAPERS: > Please regard this as General Guidelines. > Prospective authors are invited to submit their > papers (about 5 to 10 pages - single space, font size of 10 to 12) > to A. W. Rhodes by February 20. E-mail submissions in > MS document or PDF formats are preferable (Fax or postal > submissions are also acceptable.) > > The length of the Camera-Ready papers (if accepted) will > be limited to 7 (IEEE style) double-column pages. Papers must > not have been previously published or currently submitted for > publication elsewhere. The first page of the paper > should include: title of the paper, name, affiliation, > postal address, E-mail address, telephone number, & > Fax number for each author. The first page should also > include the name of the author who will be presenting > the paper (if accepted) and a maximum of 5 keywords. > Also, the name of the conference that the paper is being > submitted to must be mentioned on the first page. > > Papers will be evaluated and fully refereed for originality, > significance, clarity, and soundness. Each paper will be > refereed by two researchers in the topical area. > The Camera-Ready papers will be reviewed by one person. > > LOCATION OF CONFERENCES: > The conferences will be held in the Monte Carlo Resort > hotel, Las Vegas, Nevada, USA (with any overflows at other > near-by hotels). The Monte Carlo Resort is a mega hotel > with excellent conference facilities and over 3,000 rooms. > The hotel is minutes from the airport with 24-hour > shuttle service to and from the airport. This hotel has > many recreational attractions, including: waterfalls, > spa, pools & kiddie pools, sunning decks, Easy River > water ride, wave pool with cascades, lighted tennis > courts, health spa (with workout equipment, whirlpool, > sauna, ...), arcade virtual reality game rooms, nightly > shows, snack bars, a number of restaurants, shopping area, > bars, ... Many of these attractions are open 24 hours a > day & most are suitable for families & children. The > negotiated room rate for conference attendees is very > reasonable. The hotel is within walking distance from > most other attractions (major shopping areas, recreational > destinations, fine dining & night clubs, free street > shows, ...). > > > SAM05 is part of the 2005 World Congress in Applied Computing is > composed of > the following 14 conferences (all will be held simultaneously, same > location > and dates June 20-23, 2005, Las Vegas, USA): > 1. The 2005 International Conference on Grid Computing > and Applications (GCA'05) > > 2. The 2005 International Conference on e-Business, > Enterprise Information Systems, e-Government, and > Outsourcing (EEE'05) > > 3. The 2005 International Conference on Biometric > Authentication (BIOAU'05) > > 4. The 2005 International Conference on Computers for > People with Special Needs (CPSN'05) > > 5. The 2005 International Conference on Data Mining > (DMIN'05) > > 6. The 2005 International Conference on Human-Computer > Interaction (HCI'05) > > 7. The 2005 International Conference on Computer Vision > (VISION'05) > > 8. The 2005 International Conference on Scientific > Computing (CSC'05) > > 9. The 2005 International Conference on Information and > Knowledge Engineering (IKE'05) > > 10. The 2005 International Conference on Security and > Management (SAM'05) > > 11. The 2005 International Conference on Mathematics and > Engineering Techniques in Medicine and Biological > Sciences (METMBS'05) > > 12. The 2005 International Conference on Algorithmic > Mathematics and Computer Science (AMCS'05) > > 13. The 2005 International Conference on Data Fusion - > From Multi-Source Data to Information (FUS'05) > > 14. The 2005 International Conference on Frontiers in > Education: Computer Science and Computer Engineering > (FECS'05) > > a link to each conference's URL can be found at > http://www.world-academy-of-science.org > > > > kind regards > -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- > Dr Anthony (Tony) RHODES e-mail: [EMAIL PROTECTED] > Associate Professor and Assistant Dean, > College of Information Systems > Zayed University > PO Box 19282 > Dubai, UAE > Ph: 9714 2082188 > Mob: 97150 6250992 > -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- > Follow the pace of nature, her secret is patience > Proper Preparation Prevents Poor Performance. > -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
