posted by user: jkawamoto || 16947 views || tracked by 33 users: [display]

CODASPY 2014 : 4th ACM Conference on Data and Application Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Conference on Data and Application Security and Privacy
 
Link: http://www.codaspy.org/
 
When Mar 3, 2014 - Mar 5, 2014
Where San Antonio, Texas, USA
Abstract Registration Due Sep 15, 2013
Submission Deadline Sep 22, 2013
Notification Due Nov 25, 2013
Final Version Due Dec 20, 2013
Categories    privacy   security
 

Call For Papers

4th ACM Conference on Data and Application Security and Privacy

March 3-5, 2014
San Antonio, Texas, USA
www.codaspy.org

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area.

The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:

- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computations
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security

INSTRUCTIONS FOR PAPER AUTHORS

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.

Submissions must be at most 10 pages in double-column ACM format (as specified at http://www.acm.org/sigs/publications/proceedings-templates/) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Submissions should be made electronically at:https://www.easychair.org/conferences/?conf=codaspy2014

INSTRUCTIONS FOR POSTER AUTHORS

The CODASPY 2014 posters track seeks to quickly disseminate novel, on-going security and privacy research at an initial stage. Poster submissions must include a three-page poster paper and a one-page slide with the poster contents (submitted as attachment) , both as PDF files. Poster papers should use the same format as full-length papers. Accepted poster papers will be included in the posters section of the conference proceedings. Submissions should be made electronically at:https://www.easychair.org/conferences/?conf=codaspy2014posterstr

IMPORTANT DATES

Paper registration: Sep. 8 (Sunday) 2013 (11:59PM EST)
Paper submission: Sep. 15 (Sunday) 2013 (11:59PM EST)
Poster submission: Sep. 29 (Sunday) 2013 (11:59PM EST)
Notification to authors: Nov. 25 (Monday) 2013
Camera-ready papers and posters: Dec. 20 (Friday) 2013

ORGANIZATION

General Chairs:

Elisa Bertino
Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University
Ravi Sandhu
Institute for Cyber Security (ICS), University of Texas at San Antonio

Technical Program Committee:

Gail-Joon Ahn, Arizona State University
William Enck, North Carolina State University
Elena Ferrari, University of Insubria
Philip W. L. Fong, University of Calgary
Debin Gao, Singapore Management University
Gabriel Ghinita, University of Massachusetts, Boston
Carl A. Gunter, University of Illinois
Hannes Hartenstein, KIT
Murat Kantarcioglu, University of Texas at Dallas
Guenter Karjoth, IBM
Ram Krishnan, University of Texas at San Antonio
Ashish Kundu, IBM T J Watson Research Center
Adam J. Lee, University of Pittsburgh
Qi Li, ETH
Fabio Martinelli, IIT-CNR
Jun Pang, University of Luxembourg
Jaehong Park, University of Texas at San Antonio (chair)
Günther Pernul, Universitt Regensburg
Alexander Pretschner, Technische Universität München
Indrajit Ray, Colorado State University
Ahmad-Reza Sadeghi, TU Darmstadt
Seung-Hyun Seo, Purdue U./Korea Internet & Security Agency
Anna Squicciarini, The Pennsylvania State University
Mahesh Tripunitara, The University of Waterloo
Jaideep Vaidya, Rutgers University
Vijay Varadharajan, Macquarie University
Danfeng Yao, Virginia Tech
Chuan Yue, University of Colorado Colorado Springs
Xinwen Zhang, Huawei Research Center

Posters Committee:

Gabriel Ghinita, University of Massachusetts Boston, USA (chair)
Ali Inan, Işık University, Turkey
Michael S. Kirkpatrick, James Madison University, USA
Ram Krishnan, University of Texas at San Antonio, USA
Hua Lu, Aalborg University, Denmark
Ian Molloy, IBM Research, USA
Li Xiong, Emory University, USA
Roland Yap, National University of Singapore, Singapore

Related Resources

FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
CODASPY 2025   The 15th ACM Conference on Data and Application Security and Privacy
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex