ASC 2011 : 10th Annual Security Conference
Call For Papers
10th Annual Security Conference
The 10th Annual Security Conference is scheduled for May 4-6, 2011 in Las Vegas, NV, USA. The Conference attracts a nice mix of participants from academia, government and industry. Co-organizers for the 2011 event are Virginia Commonwealth University, University of Plymouth, Oklahoma State University and University of South Australia. Administrative offices for the conference are at Virginia Commonwealth University.
Gurpreet Dhillon, Virginia Commonwealth University, USA
Steve Furnell, University of Plymouth, UK
Mark Weiser, Oklahoma State University, USA
Malcolm Pattinson, University of South Australia, Australia
Call for Papers
Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be techical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome completed research, research in progress or formative papers for the 10th Annual Security Conference.
Recommended Topics (but not limited to)
• Emergent challenges in security, assurance and privacy
• Theories, methods, tools and techniques in managing security and privacy
• Secure communications
• Security and privacy considerations in systems analysis and design
• Security and privacy of databases
• Encryption and cryptography
• Security assurance and privacy
• Organizational considerations in security policy formulation and implementation
• Culture, security and privacy
• Normative structures and security of systems
• Regulatory aspects of security, assurance and privacy
• Security and privacy standards
Type 1: Completed Research Papers. Such papers need to be extensive. Usually a research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) would be necessary. Research papers will be presented in a regular conference session. Typical length would be around 5000-6000 words. All research papers will be considered for publication in the Journal of Information System Security (JISSec).
Type 2: Case Studies. Case studies are typically descriptions of a given security situation. Names of organizations/actors can be kept anonymous to maintain confidentiality. Typical length would be around 5000-6000 words. All case studies will be considered for publication in the Journal of Information System Security (JISSec)
Type 3: Abstract Submissions. Submissions of this type are formative in nature. Authors are encouraged to submit an abstract and present their ideas at the conference. This submission category allows authors to test initial ideas and/or 'workshop'their papers/concepts.
All submissions are double blind peer reviewed.
• Upload MS Word files only. All other file types will be rejected.
• Format the document as per the APA format
• Choose a track/category/submission type
• Enter the complete author details in the submission form. Failure to do so will result in inaccurate data in the submission system and eventually in the conference proceedings.
• All author details, in correct sequence, needs to be provided at the time of submission. Authors cannot be added or deleted after acceptance. Any changes to authorship (number or sequnce) can only be made after a written statement is received from all authors of the manuscript.
Limit on number of papers
Although authors are allowed to have multiple submissions, but in no case will be allowed to present more than twice. If a situation arises where an author may have more than 2 papers accepted in the conference, co-authors must register and present.
Submissions at: www.security-conference.org/submit.htm
Submission: March 10, 2011
Conference dates: May 4-6, 2011