posted by user: xu_shuting || 4076 views || tracked by 8 users: [display]

ASC 2011 : 10th Annual Security Conference

FacebookTwitterLinkedInGoogle

Link: http://security-conference.org/index.html
 
When May 4, 2011 - May 6, 2011
Where Las Vegas, NV, USA
Submission Deadline Mar 10, 2011
Categories    security   assurance   privacy
 

Call For Papers

10th Annual Security Conference

Website: http://security-conference.org/index.html

The 10th Annual Security Conference is scheduled for May 4-6, 2011 in Las Vegas, NV, USA. The Conference attracts a nice mix of participants from academia, government and industry. Co-organizers for the 2011 event are Virginia Commonwealth University, University of Plymouth, Oklahoma State University and University of South Australia. Administrative offices for the conference are at Virginia Commonwealth University.

Chairs
General Chair
Gurpreet Dhillon, Virginia Commonwealth University, USA

Co-Conference Chairs
Steve Furnell, University of Plymouth, UK
Mark Weiser, Oklahoma State University, USA
Malcolm Pattinson, University of South Australia, Australia

Call for Papers
Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be techical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome completed research, research in progress or formative papers for the 10th Annual Security Conference.

Recommended Topics (but not limited to)
• Emergent challenges in security, assurance and privacy
• Theories, methods, tools and techniques in managing security and privacy
• Secure communications
• Security and privacy considerations in systems analysis and design
• Security and privacy of databases
• Encryption and cryptography
• Security assurance and privacy
• Organizational considerations in security policy formulation and implementation
• Culture, security and privacy
• Normative structures and security of systems
• Regulatory aspects of security, assurance and privacy
• Security and privacy standards

Submission Types

Type 1: Completed Research Papers. Such papers need to be extensive. Usually a research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) would be necessary. Research papers will be presented in a regular conference session. Typical length would be around 5000-6000 words. All research papers will be considered for publication in the Journal of Information System Security (JISSec).

Type 2: Case Studies. Case studies are typically descriptions of a given security situation. Names of organizations/actors can be kept anonymous to maintain confidentiality. Typical length would be around 5000-6000 words. All case studies will be considered for publication in the Journal of Information System Security (JISSec)

Type 3: Abstract Submissions. Submissions of this type are formative in nature. Authors are encouraged to submit an abstract and present their ideas at the conference. This submission category allows authors to test initial ideas and/or 'workshop'their papers/concepts.

All submissions are double blind peer reviewed.

Author Instructions

• Upload MS Word files only. All other file types will be rejected.
• Format the document as per the APA format
• Choose a track/category/submission type
• Enter the complete author details in the submission form. Failure to do so will result in inaccurate data in the submission system and eventually in the conference proceedings.
• All author details, in correct sequence, needs to be provided at the time of submission. Authors cannot be added or deleted after acceptance. Any changes to authorship (number or sequnce) can only be made after a written statement is received from all authors of the manuscript.

Limit on number of papers

Although authors are allowed to have multiple submissions, but in no case will be allowed to present more than twice. If a situation arises where an author may have more than 2 papers accepted in the conference, co-authors must register and present.

Submissions at: www.security-conference.org/submit.htm

Important Dates

Submission: March 10, 2011
Conference dates: May 4-6, 2011


Related Resources

APSIPA ASC 2020   Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2020)
AVC 2020   Advances in Vision Computing: An International Journal
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
SPIoT 2020   9th International Symposium on Security and Privacy on the Internet of Things
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
JSE 2020   9th International Conference on Software Engineering and Applications
CCNC 2021   IEEE Consumer Communications & Networking Conference
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
IJCCSA 2020   International Journal on Cloud Computing: Services and Architecture