3rd Workshop on Emerging Aspects in Information Security (EAIS'16)

Gdansk, Poland, 11 - 14 September, 2016

Admittedly, information security works as a backbone for protecting both user data and electronic transactions. Protecting the communication and data infrastructure of an increasingly inter-connected world has become vital nowadays. Security has emerged as an important scientific discipline whose many multifaceted complexities deserve the attention and synergy of the computer science, engineering, and information systems communities. Information security has some well-founded technical research directions which encompass access level (user authentication and authorization), protocol security, software security, and data cryptography. Moreover, some other emerging topics related to organizational security aspects have appeared beyond the long-standing research directions.

The Emerging Aspects in Information Security (EAIS’16) workshop focuses on the diversity of the information security developments and deployments in order to highlight the most recent challenges and report the most recent researches. The workshop is an umbrella for all information security technical aspects. In addition, it goes beyond the technicalities and covers some emerging topics like social and organizational security research directions. EAIS’16 is intended to attract researchers and practitioners from academia and industry, and provides an international discussion forum in order to share their experiences and their ideas concerning emerging aspects in information security met in different application domains. This opens doors for highlighting unknown research directions and tackling modern research challenges. The objectives of the EAIS’16 workshop can be summarized as follows:

  • To review and conclude researches in information security and other security domains, focused on the protection of different kinds of assets and processes, and to identify approaches that may be useful in the application domains of information security
  • To find synergy between different approaches, allowing to elaborate integrated security solutions, e.g. integrate different risk-based management systems
  • To exchange security-related knowledge and experience between experts to improve existing methods and tools and adopt them to new application areas
  • To present latest security challenges, especially with respect to EC Horizon 2020


Topics of interest include but are not limited to:

  • Biometric technologies
  • Human factor in security
  • Cryptography and cryptanalysis
  • Critical infrastructure protection
  • Hardware-oriented information security
  • Social theories in information security
  • Organization- related information security
  • Pedagogical approaches for information security
  • Individual identification and privacy protection
  • Information security and business continuity management
  • Decision support systems for information security
  • Digital right management and data protection
  • Cyber and physical security infrastructures
  • Risk assessment and risk management in different application domains
  • Tools supporting security management and development
  • Emerging technologies and applications
  • Digital forensics and crime science
  • Misuse and intrusion detection
  • Security knowledge management
  • Data hide and watermarking
  • Cloud and big data security
  • Computer network security
  • Security and safety
  • Assurance methods
  • Security statistics

Paper submission

Important dates

  • Call for event proposals: October 30, 2015
  • Paper submission: April 18, 2016
  • Position paper submission: May 30, 2016
  • Acceptance decision: June 13, 2016
  • Final version of paper submission: July 04, 2016
  • Final deadline for discounted fee: July 31, 2016
  • Conference dates: September 11-14, 2016

FedCSIS is organized by