| |||||||||||||
ACSAC 2011 : The 27th Annual Computer Security Applications ConferenceConference Series : Annual Computer Security Applications Conference | |||||||||||||
Link: http://www.acsac.org/2011/cfp/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference. We are soliciting submissions in a number of different categories: • Technical Track: peer-reviewed papers • Case Studies: practical experience reports from applying security • Courses/Tutorials: in depth classes on current security topics • Panels: proposals for interactive panels • Posters: new and innovative preliminary work • Workshops: on up to date hot topics • Works in Progress: works in progress, not yet ready for publishing We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are: Access control Assurance Audit and audit reduction Biometrics Boundary control devices Certification and accreditation Database security Denial of service protection Distributed systems security Electronic commerce security Enterprise security management Forensics Identity management Incident response planning Insider threat protection Integrity Intellectual property rights protection Intrusion detection and prevention Malware Mobile and wireless security Multimedia security Network resiliency Operating systems security Peer-to-peer security Privacy and data protection Privilege management Product evaluation criteria and compliance Risk/vulnerability assessment Securing cloud infrastructures Security engineering and management Security in service oriented architectures Security usability Software security Supply chain risk management Trust management Virtualization security VoIP security Web 2.0/3.0 security |
|