ITS 20112

Annual International Conference on Information Security Technology (ITS 2011) http://www.itsecurityconf.org/

Date: 24-25 November 2011 Venue: Hotel Fort Canning, Singapore

Despite budget cuts made across the board, many companies did not compromise on IT security. This is because much of our daily life is dependent on computers. We check our emails and log onto social networking sites several times a day. For many industries, emailing is a common mode of communication and we often take for granted the stability and security of our software.

With computer hackers becoming increasingly sophisticated and the number of emerging threats rising, it is important to equip ourselves with the right preventive measures. IT security problems arise not only from external sources, but also from careless behavior. This can be easily solved by providing relevant training and ongoing awareness communications and activities for employees and students.

IT security refers to a company’s ability to protect the confidentiality, integrity and availability of their data and transactions. The current standards for IT security are ISO 27001 standard and NIST 800 standard series.

As the need for IT security expands, so will the influx of security programs. Therefore, it is crucial to be well informed and educated with the right information to cater to your respective needs. The IT security conference will discuss a range of topics from various preventive methods and finding the right one for your business.

The conference program offers insightful plenary and keynote addresses, stimulating technical sessions, seminars and panel discussions, poster sessions and multiple social and networking opportunities.

[KEY TOPICS INCLUDE BUT ARE NOT LIMITED TO:]

Security of Web-based applications and services Anti-malware techniques: detection, analysis, and prevention Intrusion prevention, detection, and response Security for electronic voting Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques Privacy and anonymity technologies Network perimeter controls: firewalls, packet filters, and application gateways Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems Security for Vehicular Ad-hoc Networks (VANETs) Security for peer-to-peer and overlay network systems Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing Implementation, deployment and management of network security policies Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management Integrating security services with system and application security facilities and protocols Public key infrastructures, key management, certification, and revocation Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost Security for collaborative applications: teleconferencing and video-conferencing Software hardening: e.g., detecting and defending against software bugs (overflows, etc.) Security for large-scale systems and critical infrastructures Integrating security in Internet protocols: routing, naming, network management

[GENERAL CHAIR]

Prof. the Hon. Dr. Stephen Martin Member, Board of Governors, Global Science & Technology Forum (GSTF) Former Speaker Parliament of Australia Former Deputy Vice Chancellor (Strategy and Planning) Curtin University of Technology Former Pro Vice Chancellor International, Victoria University

[PROGRAM CO-CHAIRS]

Prof. P.K. Kapur Dean, Faculty of Mathematical Science, University of Delhi

Dr. Xu Wang Heriot Watt University,

[CO EDITORS / REVIEWERS-IN-CHARGE]

Dr. S. Ramachandram University College of Engineering

Dr. Aruna Jain Birla Institute of Technology,Mesra

[PROGRAM COMMITTEE]

Prof. Bharat Bhargava Purdue University,

Prof. Selwyn Piramuthu University of Florida,

Prof. SH (Basie) von Solms University of Johannesburg,

Prof. Margaret Tan Nanyang Technological University Singapore,

Assoc. Prof. Junbin Gao Charles Sturt University,

Dr. Santi Prasad Maity Bengal Engineering & Science University, Shibpur

Dr. Maninder Singh Thapar University, India

Dr. A K Verma Thapar University, India

Dr. Udayan Chanda Yonsei University, Seoul, Korea

Dr. Wan D. Bae University of Wisconsin-Stout,

Dr. Youngjae Kim Oak Ridge National Laboratory (ORNL)

Peter Palensky Business Unit for Sustainable Building Technologies Austrian Institute of Technology (AIT)

Dr. Pavinder Singh Deenbandhu Chhotu Ram University of Science & Technology, Murthal, India

[CONTACT INFORMATION]

Email: info@itsecurityconf.org Website: http://www.itsecurityconf.org/ DID: +65 6327 0165/66 Fax: +65 6327 0162