posted by system || 5888 views || tracked by 11 users: [display]

ASIACCS 2010 : 5th ACM Symposium on Information, Computer and Communications Security

FacebookTwitterLinkedInGoogle

Link: http://www.dacas.cn/asiaccs2010/
 
When Apr 13, 2010 - Apr 16, 2010
Where Beijing, China
Submission Deadline Sep 28, 2009
Notification Due Dec 8, 2009
Final Version Due Jan 8, 2010
Categories    security
 

Call For Papers

5th ACM Symposium on Information, Computer and Communications Security
Beijing, China, April 13-16, 2010
URL: http://www.dacas.cn/asiaccs2010
Sponsored by:
ACM SIGSAC (www.acm.org)

PAPER SUBMISSION DEADLINE September 28, 2009

****************************************************************************

To build on the success of ACM Conference on Computer and Communications
Security (CCS) and ACM Transactions on Information and System Security
(TISSEC), the ACM Special Interest Group on Security, Audit, and Control
(SIGSAC) formally established the annual ACM Symposium on InformAtion,
Computer and Communications Security (ASIACCS). The inaugural ASIACCS was
held in 2006. ASIACCS 2010 is the fifth conference of this series.

ASIACCS is a major international forum for information security researchers,
practitioners, developers, and users to explore and exchange the latest
cyber-security ideas, breakthroughs, findings, techniques, tools, and
experiences. We invite submissions from academia, government, and industry
presenting novel research on all theoretical and practical aspects of
computer and network security.

PAPERS: Technical papers describing original unpublished research are
solicited. Submissions must not be concurrently under review by a
conference, journal, or any other venue that has proceedings.

SUBMISSION INSTRUCTIONS: Submissions must be at most ten pages in
double-column ACM format (note: pages must be numbered), excluding the
bibliography and well-marked appendices and at most 12 pages overall.
Committee members are not required to read appendices, so the paper should
be intelligible without them. All submissions must be nonymized (an author's
name should only occur in references to that author's related work, which
should be referenced in the third person and not overtly distinguishable
from the referenced work of others). Only PDF or Postscript files will be
accepted. Submissions not meeting these guidelines risk rejection without
consideration of their merits.

All papers should be submitted through the website:
http://www.easychair.org/conferences/?conf=asiaccs2010

Accepted papers will be published by ACM Press in conference proceedings.
Final proceedings versions will be 10 pages in double-column ACM format;
although authors will have the option of buying a limited number of
additional pages. In addition to regular papers, some poster papers could
also be accepted and included in the proceedings.


TOPICS of interest include:
---------------------------
* anonymity
* access control
* secure networking
* accounting and audit
* key management
* intrusion detection
* authentication
* smartcards
* data and application security
* Malware and botnets
* privacy-enhancing technology
* software security
* inference/controlled disclosure
* intellectual-property protection
* digital-rights management
* trusted computing
* phishing and countermeasures
* commercial and industry security
* security management
* web security
* applied cryptography
* mobile-computing security
* cryptographic protocols
* data/system integrity
* information warfare
* formal methods for security
* identity management
* security in ubiquitous computing, e.g., RFIDs
* security and privacy for emerging technologies, e.g., VoIP,
peer-to-peer and overlay network systems, Web 2.0

WORKSHOPS: Proposals for one-day workshops to be held in conjunction with
the conference are solicited. A maximum of 2 pages should be submitted which
include the workshop name, its scope and a list of topic of interests.
Proposals should be submitted to the General Chair (via jing@is.ac.cn) by
August 12, 2009.

DEMOS: Proposals for research and industrial demos are solicited. A maximum
of 2 pages should be submitted which include a description of the demo and
needed resources from the conference organizers. Proposals should be
submitted to the General Chair (via jing@is.ac.cn) by Dec 1, 2009.

TUTORIALS: Proposals are solicited for tutorials on all topics of
Information security. Submissions should include a 3 to 4 pages extended
abstract and a cover sheet describes its length and intended audience.
Proposals should be
submitted to the General Chair (via jing@is.ac.cn) by Dec 1, 2009

IMPORTANT DATES
----------------------------------------
Submission deadline: September 28, 2009
Author Notification: December 8, 2009
Camera-ready deadline: January 8, 2010


CONFERENCE ORGANIZING COMMITTEE
--------------------------------
General Chair:
Dengguo Feng (Chinese Academy of Sciences, China)

Program Chairs:
David Basin (ETH Zurich, Switzerland)
Peng Liu (Pennsylvania State University, USA)

Local Arrangements Committee:
Jiwu Jing (chair), Chinese Academy of Sciences, China

Publication Chair:
Peng Ning (NC State University, USA)

Publicity Chair:
Jie Li (University of Tsukuba, Japan)

Workshop Chair:
Dongdai Lin (Chinese Academy of Sciences, China)

Treasurer:
Sencun Zhu (Pennsylvania State University, USA)

Web Chair:
Ji Xiang (Chinese Academy of Sciences, China)

TECHNICAL PROGRAM COMMITTEE
---------------------------
N. Asokan, Nokia Research Center
Vijay Atluri, Rutgers University, USA
Michael Backes, Saarland University, Germany
David Brumley, Carnegie Mellon University, USA
Jan Camenisch, IBM Zurich Research Laboratory, Switzerland
Zhenfu Cao, Shanghai Jiao Tong University, China
Srdjan Capkun, ETH Zurich, Switzerland
Kefei Chen, Shanghai Jiao Tong University, China
Tzi-cker Chiueh, Stony Brook University, USA
Hubert Comon-Lundh, ENS Cachan, France
Marc Dacier, Symantec Research Labs Europe
Robert Deng, Singapore Management University, Singapore
Bao Feng, Institute for Infocomm Research, Singapore
Virgil Gligor, Carnegie Mellon University, USA
Guofei Gu, Texas A&M University, USA
Qijun Gu, Texas State University, USA
Jiwu Jing, Chinese Academy of Sciences, China
Shriram Krishnamurthi, Brown University, USA
Jie Li, University of Tsukuba, Japan
Yingjiu Li, Singapore Management University, Singapore
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, Naval Research Laboratory, USA
Chris Mitchell, Royal Holloway, UK
Eiji Okamoto, University of Tsukuba, Japan
Peng Ning, NC State University, USA
Panagiotis Papadimitratos, EPFL Lausanne, Switzerland
Alexander Pretschner, University of Kaiserslautern, Germany
Michael Rusinowitch, LORIA-INRIA-Lorraine, France
Andrei Sabelfeld, Chalmers University, Sweden
Pierangela Samarati, University of Milan, Italy
Shiuhpyng Shieh, National Chiao Tung University, Chinese Taipei
Anna Squicciarini, Pennsylvania State University, USA
Vijay Varadharajan, Macquarie University, Australia
Dongyan Xu, Purdue University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

See: http://www.dacas.cn/asiaccs2010/

Related Resources

SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
CCET 2025   2025 8th International Conference on Computer and Communication Engineering Technology (CCET 2025)