posted by user: heljanic || 12703 views || tracked by 15 users: [display]

SEC@SAC 2012 : The 11th edition of the Computer Security track at the 27th ACM Symposium on Applied Computing

FacebookTwitterLinkedInGoogle

Link: http://www.dmi.unict.it/~giamp/sac/cfp2012.php
 
When Mar 25, 2012 - Mar 29, 2012
Where University of Trento, Trento, Italy
Submission Deadline Sep 4, 2011
Notification Due Oct 12, 2011
Final Version Due Nov 2, 2011
Categories    security   cryptography   policy-based management   cyber-security
 

Call For Papers

SEC@SAC12
The 11th edition of the Computer Security track
at the 27th ACM Symposium on Applied Computing
March 2012, Microsoft Research - University of Trento, Trento, Italy

CALL FOR PAPERS

The Symposium

For the past twenty-seven years, the ACM Symposium on Applied
Computing has been a primary gathering forum for applied computer
scientists, computer engineers, software engineers, and application
developers from around the world. SAC 2012 is sponsored by the ACM
Special Interest Group on Applied Computing (SIGAPP), and is hosted by
The Microsoft Research -- University of Trento, Trento, Italy.

For the past twenty-seven years the ACM Symposium on Applied Computing
(SAC) has been a primary forum for applied computer scientists,
computer engineers and application developers to gather, interact, and
present their research. SAC is sponsored by the ACM Special Interest
Group on Applied Computing (SIGAPP http://www.acm.org/sigapp); its
proceedings are published by ACM in both printed form and CD-ROM; they
are also available on the web through the ACM Digital Library
http://www.acm.org/dl. More information about SIGAPP and past editions
of SAC can be found at http://www.acm.org/sigapp The Computer Security
track (11th edition)

The Security Track reaches its eleventh edition this year, thus
appearing among the most established tracks in the Symposium. The list
of issues remains vast, ranging from protocols to work-flows.

Topics of interest include but are not limited to:

* software security (protocols, operating systems, etc.)
* hardware security (smartcards, biometric technologies, etc.)
* mobile security (properties for/from mobile agents, etc.)
* network security (anti-virus, anti-hacker, anti-DoS tools,
firewalls, real-time monitoring, etc.)
* alternatives to cryptography (steganography, etc.)
* security-specific software development practices (vulnerability
testing, fault-injection resilience, etc.)
* privacy and anonymity (trust management, pseudonymity,
identity management, electronic voting, etc.)
* safety and dependability issues (reliability, survivability, etc.)
* cyberlaw and cybercrime (copyrights, trademarks, defamation,
intellectual property, etc.)
* security management and usability issues (security configuration,
policy management, usability trials etc.)
* workflow and service security (business processes,
web services, etc.)
* security in cloud computing and virtualised environments

Important Dates

4 September 2011, midnight CEST (extended, firm) Submission of full papers
12 October 2011 Notification of Acceptance/Rejection
2 November 2011 Camera-Ready copies of accepted papers
March 2012 SAC 2012 takes place


Best Papers

The best papers of the 2003 edition are published in a special issue
of Concurrency and Computation: Practice and Experience (Wiley) ,
vol. 16, no.1, 2004. The best papers of the 2004 edition are published
in a special issue of the Journal of Computer Security (IOS) ,
vol. 13, no.5, 2005. The best papers of the 2006 edition are published
in a special issue of the Journal of Computer Security (IOS) ,
vol. 17, no.3, 2009.

This practice will be continued on the basis of appropriateness of the
submissions.

Track Program Chairs

* Giampaolo BELLA
(email: giamp@dmi.unict.it web: http://www.dmi.unict.it/~giamp/)
Dipartimento di Matematica e Informatica, Universita' di Catania, Italy.
Software Technology Research Laboratory, De Montfort University, UK.

* Helge JANICKE
(email: heljanic@dmu.ac.uk web: http://www.tech.dmu.ac.uk/~heljanic/)
Software Technology Research Laboratory, De Montfort University, UK.

* Alessandro SORNIOTTI
(email: aso@zurich.ibm.com web: http://ale.sopit.net/)
IBM Research Lab (Zurich)


Program Committee

* Gail-Joon Ahn (Department of Computer Science and Engineering,
Arizona State University, USA)
* Manuel Barbosa (Universidade do Minho, Portugal)
* Arslan Broemme (Vattenfall, Germany)
* Iliano Cervesato (Carnegie Mellon University, Qatar)
* David W Chadwick (Computing Laboratory, University of Kent, UK)
* Bruce Christianson (School of Computer Science,
University of Hertfordshire, UK)
* Simon Foley (Department of Computer Science, University College,
Cork, Ireland)
* Dieter Gollmann (TU Hamburg, Germany)
* Stefanos Gritzalis (Department of Information and Communication
Systems Engineering, University of the Aegean, Greece)
* Sokratis K Katsikas (Department of Digital Systems,
University of Piraeus, Greece)
* Helmut Kurth (ATSEC, Germany)
* Gabriele Lenzini (University of Luxembourg)
* Chris Lesniewski-Laas (Google, USA)
* Volkmar Lotz (SAP Research, France)
* Fabio Martinelli (National Research Council, Italy)
* John McDermott (Naval Research Lab, USA)
* Chris Mitchell (Royal Holloway, University of London, UK)
* Dusko Pavlovic (Kestrel Institute, USA, & Royal Holloway
University of London, UK)
* Graham Steel (INRIA, France)


Submission Guidelines

The submission guidelines must be strictly followed for a paper to be
considered.

Original papers from the above mentioned or other related areas will
be considered. Only full papers about original and unpublished
research are sought. Parallel submission to other conferences or other
tracks of SAC 2012 is forbidden. Each paper must be BLIND in the sense
that it must only include its title but not mention anything about its
authors. Self-reference must be blind too. All submissions must be
formatted using the ACM conference-specific LaTeX style, which can be
obtained from the symposium web page. The standard extension of a
submission in the stated format is 6 pages. Longer papers (up to 8
pages maximum) will imply an additional charge. All papers must be
submitted by 31 August 2011.

There is a symposium-wide paper management system for SAC 2012, which
authors must use to submit their papers. Review and publication of
accepted papers

Each paper will be fully refereed and undergo a blind review process
by at least three referees. Accepted papers will be published in the
ACM SAC 2012 proceedings. Some papers may only be accepted as poster
papers, and will be published as extended 2-page abstracts in the
proceedings. According to the authors' guidelines, which can be
obtained from the symposium web page, at least one author per paper
must register before their paper is included in the proceedings.

Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
IJCSITY 2024   International Journal of Computational Science and Information Technology
RE-SAC 2025   Requirements Engineering Track (18th Edition) at the 40th Annual ACM Symposium on Applied Computing (ACM SAC'2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SEAS 2025   14th International Conference on Software Engineering and Applications
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus