posted by user: zxin || 13014 views || tracked by 35 users: [display]

ACSAC 2011 : The 27th Annual Computer Security Applications Conference

FacebookTwitterLinkedInGoogle


Conference Series : Annual Computer Security Applications Conference
 
Link: http://www.acsac.org/2011/cfp/
 
When Dec 5, 2011 - Dec 9, 2011
Where Orlando, Florida
Submission Deadline Jun 6, 2011
Notification Due Aug 15, 2011
Categories    security
 

Call For Papers

ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.

If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.

We are soliciting submissions in a number of different categories:
• Technical Track: peer-reviewed papers
• Case Studies: practical experience reports from applying security
• Courses/Tutorials: in depth classes on current security topics
• Panels: proposals for interactive panels
• Posters: new and innovative preliminary work
• Workshops: on up to date hot topics
• Works in Progress: works in progress, not yet ready for publishing
We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:
Access control
Assurance
Audit and audit reduction
Biometrics
Boundary control devices
Certification and accreditation
Database security
Denial of service protection
Distributed systems security
Electronic commerce security
Enterprise security management
Forensics
Identity management
Incident response planning
Insider threat protection
Integrity
Intellectual property rights protection
Intrusion detection and prevention
Malware
Mobile and wireless security
Multimedia security
Network resiliency
Operating systems security
Peer-to-peer security
Privacy and data protection
Privilege management
Product evaluation criteria and compliance
Risk/vulnerability assessment
Securing cloud infrastructures
Security engineering and management
Security in service oriented architectures
Security usability
Software security
Supply chain risk management
Trust management
Virtualization security
VoIP security
Web 2.0/3.0 security

Related Resources

S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
IEEE COINS 2021   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
S&P 2022   IEEE Symposium on Security and Privacy (Second deadline)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
SI-D2CSCAI 2021   CfP - Special Issue Data-Driven Cybersecurity and Safety for Critical Applications and Infrastructures (MDPI Sensors - IF= 3.275)
IJCIS 2021   International Journal on Cryptography and Information Security
ICBAE 2021   [Ei Compendex & SCOPUS] 2021 International Conference on Biomaterials and Applications Engineering (IC-BAE 2021)
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
JEDT 2021   International Journal of Electronic Design and Test
SNSA-SI-MDPI 2021   Sensor Networks Security and Applications