posted by user: xu_shuting || 4659 views || tracked by 8 users: [display]

ASC 2011 : 10th Annual Security Conference

FacebookTwitterLinkedInGoogle

Link: http://security-conference.org/index.html
 
When May 4, 2011 - May 6, 2011
Where Las Vegas, NV, USA
Submission Deadline Mar 10, 2011
Categories    security   assurance   privacy
 

Call For Papers

10th Annual Security Conference

Website: http://security-conference.org/index.html

The 10th Annual Security Conference is scheduled for May 4-6, 2011 in Las Vegas, NV, USA. The Conference attracts a nice mix of participants from academia, government and industry. Co-organizers for the 2011 event are Virginia Commonwealth University, University of Plymouth, Oklahoma State University and University of South Australia. Administrative offices for the conference are at Virginia Commonwealth University.

Chairs
General Chair
Gurpreet Dhillon, Virginia Commonwealth University, USA

Co-Conference Chairs
Steve Furnell, University of Plymouth, UK
Mark Weiser, Oklahoma State University, USA
Malcolm Pattinson, University of South Australia, Australia

Call for Papers
Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be techical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome completed research, research in progress or formative papers for the 10th Annual Security Conference.

Recommended Topics (but not limited to)
• Emergent challenges in security, assurance and privacy
• Theories, methods, tools and techniques in managing security and privacy
• Secure communications
• Security and privacy considerations in systems analysis and design
• Security and privacy of databases
• Encryption and cryptography
• Security assurance and privacy
• Organizational considerations in security policy formulation and implementation
• Culture, security and privacy
• Normative structures and security of systems
• Regulatory aspects of security, assurance and privacy
• Security and privacy standards

Submission Types

Type 1: Completed Research Papers. Such papers need to be extensive. Usually a research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) would be necessary. Research papers will be presented in a regular conference session. Typical length would be around 5000-6000 words. All research papers will be considered for publication in the Journal of Information System Security (JISSec).

Type 2: Case Studies. Case studies are typically descriptions of a given security situation. Names of organizations/actors can be kept anonymous to maintain confidentiality. Typical length would be around 5000-6000 words. All case studies will be considered for publication in the Journal of Information System Security (JISSec)

Type 3: Abstract Submissions. Submissions of this type are formative in nature. Authors are encouraged to submit an abstract and present their ideas at the conference. This submission category allows authors to test initial ideas and/or 'workshop'their papers/concepts.

All submissions are double blind peer reviewed.

Author Instructions

• Upload MS Word files only. All other file types will be rejected.
• Format the document as per the APA format
• Choose a track/category/submission type
• Enter the complete author details in the submission form. Failure to do so will result in inaccurate data in the submission system and eventually in the conference proceedings.
• All author details, in correct sequence, needs to be provided at the time of submission. Authors cannot be added or deleted after acceptance. Any changes to authorship (number or sequnce) can only be made after a written statement is received from all authors of the manuscript.

Limit on number of papers

Although authors are allowed to have multiple submissions, but in no case will be allowed to present more than twice. If a situation arises where an author may have more than 2 papers accepted in the conference, co-authors must register and present.

Submissions at: www.security-conference.org/submit.htm

Important Dates

Submission: March 10, 2011
Conference dates: May 4-6, 2011


Related Resources

CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
JoL 2024   International Journal of Law
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
S&P 2025   The 45th IEEE Symposium on Security and Privacy
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1