posted by user: xu_shuting || 4900 views || tracked by 8 users: [display]

ASC 2011 : 10th Annual Security Conference

FacebookTwitterLinkedInGoogle

Link: http://security-conference.org/index.html
 
When May 4, 2011 - May 6, 2011
Where Las Vegas, NV, USA
Submission Deadline Mar 10, 2011
Categories    security   assurance   privacy
 

Call For Papers

10th Annual Security Conference

Website: http://security-conference.org/index.html

The 10th Annual Security Conference is scheduled for May 4-6, 2011 in Las Vegas, NV, USA. The Conference attracts a nice mix of participants from academia, government and industry. Co-organizers for the 2011 event are Virginia Commonwealth University, University of Plymouth, Oklahoma State University and University of South Australia. Administrative offices for the conference are at Virginia Commonwealth University.

Chairs
General Chair
Gurpreet Dhillon, Virginia Commonwealth University, USA

Co-Conference Chairs
Steve Furnell, University of Plymouth, UK
Mark Weiser, Oklahoma State University, USA
Malcolm Pattinson, University of South Australia, Australia

Call for Papers
Security, assurance and privacy challenges are abound. Advances in information and communication technologies have brought many security problems to the fore. Such problems may be techical in nature or organizationally grounded. Whatever be the nature and scope of the security problems, there is a need to engage in discourses pertaining to security, assurance and privacy. To that effect we welcome completed research, research in progress or formative papers for the 10th Annual Security Conference.

Recommended Topics (but not limited to)
• Emergent challenges in security, assurance and privacy
• Theories, methods, tools and techniques in managing security and privacy
• Secure communications
• Security and privacy considerations in systems analysis and design
• Security and privacy of databases
• Encryption and cryptography
• Security assurance and privacy
• Organizational considerations in security policy formulation and implementation
• Culture, security and privacy
• Normative structures and security of systems
• Regulatory aspects of security, assurance and privacy
• Security and privacy standards

Submission Types

Type 1: Completed Research Papers. Such papers need to be extensive. Usually a research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) would be necessary. Research papers will be presented in a regular conference session. Typical length would be around 5000-6000 words. All research papers will be considered for publication in the Journal of Information System Security (JISSec).

Type 2: Case Studies. Case studies are typically descriptions of a given security situation. Names of organizations/actors can be kept anonymous to maintain confidentiality. Typical length would be around 5000-6000 words. All case studies will be considered for publication in the Journal of Information System Security (JISSec)

Type 3: Abstract Submissions. Submissions of this type are formative in nature. Authors are encouraged to submit an abstract and present their ideas at the conference. This submission category allows authors to test initial ideas and/or 'workshop'their papers/concepts.

All submissions are double blind peer reviewed.

Author Instructions

• Upload MS Word files only. All other file types will be rejected.
• Format the document as per the APA format
• Choose a track/category/submission type
• Enter the complete author details in the submission form. Failure to do so will result in inaccurate data in the submission system and eventually in the conference proceedings.
• All author details, in correct sequence, needs to be provided at the time of submission. Authors cannot be added or deleted after acceptance. Any changes to authorship (number or sequnce) can only be made after a written statement is received from all authors of the manuscript.

Limit on number of papers

Although authors are allowed to have multiple submissions, but in no case will be allowed to present more than twice. If a situation arises where an author may have more than 2 papers accepted in the conference, co-authors must register and present.

Submissions at: www.security-conference.org/submit.htm

Important Dates

Submission: March 10, 2011
Conference dates: May 4-6, 2011


Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
APSIPA ASC 2024   APSIPA ASC 2024 : Asia-Pacific Signal and Information Processing Association Annual Summit and Conference
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence