posted by user: heljanic || 9306 views || tracked by 19 users: [display]

SEC@SAC 2013 : Computer Security track at the 28th ACM Symposium on Applied Computing

FacebookTwitterLinkedInGoogle

Link: http://www.dmi.unict.it/~giamp/sac/cfp2013.php
 
When Mar 18, 2013 - Mar 22, 2013
Where Coimbra, Portugal
Submission Deadline Sep 21, 2012
Notification Due Nov 10, 2012
Final Version Due Nov 30, 2012
Categories    computer security   software security   safety
 

Call For Papers

CALL FOR PAPERS SEC@SAC13

The 12th edition of the Computer Security track
at the 28th ACM Symposium on Applied Computing
18-22 March 2013, Coimbra, Portugal


The Symposium

For the past twenty-eight years, the ACM Symposium on Applied
Computing has been a primary gathering forum for applied computer
scientists, computer engineers, software engineers, and application
developers from around the world. SAC 2013 is sponsored by the ACM
Special Interest Group on Applied Computing (SIGAPP
http://www.acm.org/sigapp); its proceedings are published by ACM in
both printed form and CD-ROM; they are also available on the web
through the ACM Digital Library http://www.acm.org/dl. More
information about SIGAPP and past editions of SAC can be found at
http://www.acm.org/sigapp


The Computer Security track (12th edition)

The Security Track reaches its twelfth edition this year, thus
appearing among the most established tracks in the Symposium. The list
of issues remains vast, ranging from protocols to work-flows.


Topics of interest include but are not limited to:

- software security (protocols, operating systems, etc.)
- hardware security (smartcards, biometric technologies, etc.)
- mobile security (properties for/from mobile agents, etc.)
- network security (anti-DoS tools, firewalls, real-time monitoring,
mobile networks, sensor networks, etc.)
- alternatives to cryptography (steganography, etc.)
- security-specific software development practices (vulnerability
testing, fault-injection resilience, etc.)
- privacy and anonymity (trust management, pseudonymity, identity
management, electronic voting, etc.)
- safety and dependability issues (reliability, survivability, etc.)
- cyberlaw and cybercrime (copyrights, trademarks, defamation,
intellectual property, etc.)
- security management and usability issues (security configuration,
policy management, usability trials etc.)
- workflow and service security (business processes, web services, etc.)
- security in cloud computing and virtualised environments


Important Dates

21 September 2012, midnight CEST Submission of full papers
10 November 2012 Notification of Acceptance/Rejection
30 November 2012 Camera-Ready copies of accepted papers
18-22 March 2013 SAC 2013 takes place


Best Papers

The best papers of the 2003 edition are published in a special issue
of Concurrency and Computation: Practice and Experience (Wiley) ,
vol. 16, no.1, 2004. The best papers of the 2004 edition are published
in a special issue of the Journal of Computer Security (IOS) ,
vol. 13, no.5, 2005. The best papers of the 2006 edition are published
in a special issue of the Journal of Computer Security (IOS) ,
vol. 17, no.3, 2009.

This practice will be continued on the basis of appropriateness of the
submissions.

Track Program Chairs

- Giampaolo BELLA (email: giamp@dmi.unict.it
web: http://www.dmi.unict.it/~giamp/)
Dipartimento di Matematica e Informatica, Universita' di
Catania, Italy. Software Technology Research Laboratory, De
Montfort University, UK.
- Helge JANICKE (email: heljanic@dmu.ac.uk
web: http://www.tech.dmu.ac.uk/~heljanic/)
Software Technology Research Laboratory, De Montfort
University, UK.
- Graham STEEL (email: graham.steel@lsv.ens-cachan.fr
web: http://www.lsv.ens-cachan.fr/~steel/)
INRIA, France


Program Committee

Manuel Barbosa (Universidade do Minho, Portugal)
Iliano Cervesato (Carnegie Mellon University, Qatar)
David W Chadwick (University of Kent, UK)
Steve Chong (Harvard University, USA)
Bruce Christianson (University of Hertfordshire, UK)
Simon Foley (University College Cork, Ireland)
Dieter Gollmann (TU Hamburg, Germany)
Stefanos Gritzalis (University of the Aegean, Greece)
Joshua Guttmann (Worcester Polytechnic Institute, USA)
Lalana Kagal (MIT, USA)
Sokratis K Katsikas (University of Piraeus, Greece)
Helmut Kurth (ATSEC, Germany)
Gabriele Lenzini (University of Luxembourg)
Hannan Lutfiyya (University of Western Ontario, Canada)
Jean Martina (Universidade Federal de Santa Catarina, Brasil)
John McDermott (Naval Research Lab, USA)
Marius Minea (Politehnica University of Timisoara, Romania)
Chris Mitchell (Royal Holloway University of London, UK)
Dusko Pavlovic (Royal Holloway University of London, UK)
Kenneth Radke (Queensland University of Technology, Australia)
Alessandro Sorniotti (IBM Research Lab Zurich, Switzerland)


Submission Guidelines

The submission guidelines must be strictly followed for a paper to be
considered.

Original papers from the above mentioned or other related areas will
be considered. Only full papers about original and unpublished
research are sought. Parallel submission to other conferences or other
tracks of SAC 2013 is forbidden. Each paper must be BLIND in the sense
that it must only include its title but not mention anything about its
authors. Self-reference must be blind too. All submissions must be
formatted using the ACM conference-specific LaTeX style, which can be
obtained from the symposium web page. The standard extension of a
submission in the stated format is 6 pages. Longer papers (up to 8
pages maximum) will imply an additional charge. All papers must be
submitted by 21 September 2012.

There is a symposium-wide paper management system for SAC 2013, which
authors must use to submit their papers.


Review and publication of accepted papers

Each paper will be fully refereed and undergo a blind review process
by at least three referees. Accepted papers will be published in the
ACM SAC 2013 proceedings. Some papers may only be accepted as poster
papers, and will be published as extended 2-page abstracts in the
proceedings. According to the authors' guidelines, which can be
obtained from the symposium web page, at least one author per accepted
paper must register before the paper is included in the
proceedings. Each accepted paper MUST be presented by an author or a
proxy at the venue: this is a requirement for the paper to be part of
the ACM/IEEE digital library.


Student research abstract competition

Graduate students are invited to submit research abstracts (minimum of
2-page and maximum of 4-page) following the instructions published at
SAC 2013 website. Submission of the same abstract to multiple tracks
is not allowed.

Contact: Giampaolo Bella, giamp@dmi.unict.it

Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
RTEE 2024   10th International Conference on Recent Trends in Electrical Engineering
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
PESARO 2025   The Fifteenth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
CompAuto--EI 2025   2025 4th International Conference on Computers and Automation (CompAuto 2025)
SCID @ AsiaCCS 2025   The 2nd workshop on Security-Centric Strategies for Combating Information Disorder