posted by organizer: mochoa || 20343 views || tracked by 37 users: [display]

CODASPY 2016 : Conference on Data and Application Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Conference on Data and Application Security and Privacy
 
Link: http://www.codaspy.org/
 
When Mar 9, 2016 - Mar 11, 2016
Where New Orleans, LA
Submission Deadline Sep 21, 2015
Notification Due Nov 23, 2015
Final Version Due Dec 22, 2015
Categories    security   privacy
 

Call For Papers

******************************************************************

Deadline extended to September 21.

******************************************************************

Call For Papers
6TH ACM Conference on Data and Application Security and Privacy 2016
http://www.codaspy.org


New Orleans, LA
March 9-11, 2016


Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area.

The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:

Application-layer security policies
Access control for applications
Access control for databases
Data-dissemination controls
Data forensics
Enforcement-layer security policies
Privacy-preserving techniques
Private information retrieval
Search on protected/encrypted data
Secure auditing
Secure collaboration
Secure data provenance
Secure electronic commerce
Secure information sharing
Secure knowledge management
Secure multiparty computations
Secure software development
Securing data/apps on untrusted platforms
Securing the semantic web
Security and privacy in GIS/spatial data
Security and privacy in healthcare
Security policies for databases
Social computing security and privacy
Social networking security and privacy
Trust metrics for applications, data, and users
Usable security and privacy
Usage Control
Web application security


Instructions for Paper Authors
-----------------------------------------
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.

Submissions must be at most 10 pages in double-column ACM format (as specified at http://www.acm.org/sigs/publications/proceedings-templates/) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Submissions should be made electronically at:
https://easychair.org/conferences/?conf=codaspy2016

Submissions that are not accepted as full papers may be invited to appear as short papers (8 pages) or posters.


Instructions for Poster Authors
------------------------------------------
The CODASPY 2015 posters track seeks to quickly disseminate novel, on-going security and privacy research at an initial stage.
Poster submissions must include a three-page poster paper and a one-page slide with the poster contents (submitted as attachment) , both as PDF files. Poster papers should use the same format as full-length papers. Accepted poster papers will be included in the posters section of the conference proceedings. Submissions should be made electronically at:
https://easychair.org/conferences/?conf=codaspy2016



Instructions for Industrial Position Paper Authors
------------------------------------------------------------------
The CODASPY 2016 industry position papers track seeks to introduce on-going security and privacy practices from industry sector. Also, industry participants will have an opportunity to meet many students and researchers in data and application security and privacy field.

Position paper submissions must include a 2-4 page paper as a PDF file. Position papers should use the same format as full-length papers. Accepted position papers will be included in the industry papers section of the conference proceedings. Submissions should be made electronically at:
https://easychair.org/conferences/?conf=codaspy2016


Important Dates
----------------------
Paper submission: September 21st, 2015 (Extended)
Poster submission: September 28th, 2015
Notification to authors: November 23rd, 2015
Camera-ready papers and posters: December 22nd, 2015


Organization: http://www.codaspy.org/organizing-committee
Program Committee: http://www.codaspy.org/program-committee

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
CRBL 2025   5th International Conference on Cryptography and Blockchain
ICDMIS 2025   International Conference on Data Mining and Information Security
IJWesT 2025   International Journal of Web & Semantic Technology
ICCDE 2025   2026 12th International Conference on Computing and Data Engineering (ICCDE 2026)
MLAIJ 2025   Machine Learning and Applications: An International Journal
AIIT 2025   XV International Conference on Applied Internet and Information Technologies
ICINT 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
CIOS 2025   3rd International Conference on Cloud, IoT and Security