posted by system || 4018 views || tracked by 5 users: [display]

CCS 2014 : 9th ACM Symposium on Information, Computer and Communications Security

FacebookTwitterLinkedInGoogle

Link: http://asiaccs2014.nict.go.jp/
 
When Jun 4, 2014 - Jun 6, 2014
Where Kyoto, Japan
Submission Deadline Dec 16, 2013
Categories    security
 

Call For Papers

Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then ASIACCS has been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), Seoul (2012), and Hangzhou (2013).

 ASIACCS 2014 is the ninth conference of the series, and will be held in Kyoto, Japan, a city renowned for its historic relics and natural beauty. Kyoto was (and some say still is a) capital of Japan for over a millennium, and contains many sites of cultural significance, including some of the most famous temples and shrines in Japan as well as imperial palaces and gardens. In addition, Kyoto is home to Nintendo among many other computer companies.

 ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2014 include, but are not limited to:

- Access control
- Accounting and audit
- Anonymity
- Applied cryptography
- Authentication
- Cloud computing security
- Data and application security
- Digital forensics
- Embedded systems security
- Formal methods for security
- Hardware-based security
- Inference control and disclosure
- Intrusion detection
- Key management
- Malware and botnets
- Mobile computing security
- Network security
- Operating system security
- Privacy-enhancing technology
- Security architectures
- Security metrics
- Software security
- Trusted computing
- Usable security and privacy
- Web security
- Wireless security

Related Resources

CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
ACISP 2017   Australasian Conference on Information Security and Privacy
IWDW2017:CUING 2017   Emerging threats of Criminal Use of Information Hiding (Special Session at IWDW2017)
ICMWT 2017   4th iCatse Conference on Mobile and Wireless Technology
ICONIP 2017   International Conference on Neural Information Processing
EuropeanSeC 2017   2017 European Security Conference
USENIX Security 2017   USENIX Security '17
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
AEIJ 2017   Advanced Energy: An International Journal
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference