posted by user: xu_shuting || 4363 views || tracked by 8 users: [display]

ASC 2011 : 10th Annual Security Conference

FacebookTwitterLinkedInGoogle

Link: http://security-conference.org/index.html
 
When May 4, 2011 - May 6, 2011
Where Las Vegas, NV, USA
Submission Deadline Mar 10, 2011
Categories    security   assurance   privacy
 

Call For Papers

10th Annual Security Conference

Website: http://security-conference.org/index.html

The 10th Annual Security Conference is scheduled for May 4-6, 2011 in Las Vegas, NV, USA. The Conference attracts a nice mix of participants from academia, government and industry. Co-organizers for the 2011 event are Virginia Commonwealth University, University of Plymouth, Oklahoma State University and University of South Australia. Administrative offices for the conference are at Virginia Commonwealth University.

Chairs
General Chair
Gurpreet Dhillon, Virginia Commonwealth University, USA

Co-Conference Chairs
Steve Furnell, University of Plymouth, UK
Mark Weiser, Oklahoma State University, USA
Malcolm Pattinson, University of South Australia, Australia

Call for Papers
Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be techical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome completed research, research in progress or formative papers for the 10th Annual Security Conference.

Recommended Topics (but not limited to)
• Emergent challenges in security, assurance and privacy
• Theories, methods, tools and techniques in managing security and privacy
• Secure communications
• Security and privacy considerations in systems analysis and design
• Security and privacy of databases
• Encryption and cryptography
• Security assurance and privacy
• Organizational considerations in security policy formulation and implementation
• Culture, security and privacy
• Normative structures and security of systems
• Regulatory aspects of security, assurance and privacy
• Security and privacy standards

Submission Types

Type 1: Completed Research Papers. Such papers need to be extensive. Usually a research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) would be necessary. Research papers will be presented in a regular conference session. Typical length would be around 5000-6000 words. All research papers will be considered for publication in the Journal of Information System Security (JISSec).

Type 2: Case Studies. Case studies are typically descriptions of a given security situation. Names of organizations/actors can be kept anonymous to maintain confidentiality. Typical length would be around 5000-6000 words. All case studies will be considered for publication in the Journal of Information System Security (JISSec)

Type 3: Abstract Submissions. Submissions of this type are formative in nature. Authors are encouraged to submit an abstract and present their ideas at the conference. This submission category allows authors to test initial ideas and/or 'workshop'their papers/concepts.

All submissions are double blind peer reviewed.

Author Instructions

• Upload MS Word files only. All other file types will be rejected.
• Format the document as per the APA format
• Choose a track/category/submission type
• Enter the complete author details in the submission form. Failure to do so will result in inaccurate data in the submission system and eventually in the conference proceedings.
• All author details, in correct sequence, needs to be provided at the time of submission. Authors cannot be added or deleted after acceptance. Any changes to authorship (number or sequnce) can only be made after a written statement is received from all authors of the manuscript.

Limit on number of papers

Although authors are allowed to have multiple submissions, but in no case will be allowed to present more than twice. If a situation arises where an author may have more than 2 papers accepted in the conference, co-authors must register and present.

Submissions at: www.security-conference.org/submit.htm

Important Dates

Submission: March 10, 2011
Conference dates: May 4-6, 2011


Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
SECRYPT 2022   19th International Conference on Security and Cryptography
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
ICDIS 2022   The 4th International Conference on Data Intelligence and Security