| |||||||||||||||
ASIACCS 2010 : 5th ACM Symposium on Information, Computer and Communications Security | |||||||||||||||
Link: http://www.dacas.cn/asiaccs2010/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
5th ACM Symposium on Information, Computer and Communications Security
Beijing, China, April 13-16, 2010 URL: http://www.dacas.cn/asiaccs2010 Sponsored by: ACM SIGSAC (www.acm.org) PAPER SUBMISSION DEADLINE September 28, 2009 **************************************************************************** To build on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in 2006. ASIACCS 2010 is the fifth conference of this series. ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the latest cyber-security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. PAPERS: Technical papers describing original unpublished research are solicited. Submissions must not be concurrently under review by a conference, journal, or any other venue that has proceedings. SUBMISSION INSTRUCTIONS: Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered), excluding the bibliography and well-marked appendices and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. All submissions must be nonymized (an author's name should only occur in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others). Only PDF or Postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. All papers should be submitted through the website: http://www.easychair.org/conferences/?conf=asiaccs2010 Accepted papers will be published by ACM Press in conference proceedings. Final proceedings versions will be 10 pages in double-column ACM format; although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some poster papers could also be accepted and included in the proceedings. TOPICS of interest include: --------------------------- * anonymity * access control * secure networking * accounting and audit * key management * intrusion detection * authentication * smartcards * data and application security * Malware and botnets * privacy-enhancing technology * software security * inference/controlled disclosure * intellectual-property protection * digital-rights management * trusted computing * phishing and countermeasures * commercial and industry security * security management * web security * applied cryptography * mobile-computing security * cryptographic protocols * data/system integrity * information warfare * formal methods for security * identity management * security in ubiquitous computing, e.g., RFIDs * security and privacy for emerging technologies, e.g., VoIP, peer-to-peer and overlay network systems, Web 2.0 WORKSHOPS: Proposals for one-day workshops to be held in conjunction with the conference are solicited. A maximum of 2 pages should be submitted which include the workshop name, its scope and a list of topic of interests. Proposals should be submitted to the General Chair (via jing@is.ac.cn) by August 12, 2009. DEMOS: Proposals for research and industrial demos are solicited. A maximum of 2 pages should be submitted which include a description of the demo and needed resources from the conference organizers. Proposals should be submitted to the General Chair (via jing@is.ac.cn) by Dec 1, 2009. TUTORIALS: Proposals are solicited for tutorials on all topics of Information security. Submissions should include a 3 to 4 pages extended abstract and a cover sheet describes its length and intended audience. Proposals should be submitted to the General Chair (via jing@is.ac.cn) by Dec 1, 2009 IMPORTANT DATES ---------------------------------------- Submission deadline: September 28, 2009 Author Notification: December 8, 2009 Camera-ready deadline: January 8, 2010 CONFERENCE ORGANIZING COMMITTEE -------------------------------- General Chair: Dengguo Feng (Chinese Academy of Sciences, China) Program Chairs: David Basin (ETH Zurich, Switzerland) Peng Liu (Pennsylvania State University, USA) Local Arrangements Committee: Jiwu Jing (chair), Chinese Academy of Sciences, China Publication Chair: Peng Ning (NC State University, USA) Publicity Chair: Jie Li (University of Tsukuba, Japan) Workshop Chair: Dongdai Lin (Chinese Academy of Sciences, China) Treasurer: Sencun Zhu (Pennsylvania State University, USA) Web Chair: Ji Xiang (Chinese Academy of Sciences, China) TECHNICAL PROGRAM COMMITTEE --------------------------- N. Asokan, Nokia Research Center Vijay Atluri, Rutgers University, USA Michael Backes, Saarland University, Germany David Brumley, Carnegie Mellon University, USA Jan Camenisch, IBM Zurich Research Laboratory, Switzerland Zhenfu Cao, Shanghai Jiao Tong University, China Srdjan Capkun, ETH Zurich, Switzerland Kefei Chen, Shanghai Jiao Tong University, China Tzi-cker Chiueh, Stony Brook University, USA Hubert Comon-Lundh, ENS Cachan, France Marc Dacier, Symantec Research Labs Europe Robert Deng, Singapore Management University, Singapore Bao Feng, Institute for Infocomm Research, Singapore Virgil Gligor, Carnegie Mellon University, USA Guofei Gu, Texas A&M University, USA Qijun Gu, Texas State University, USA Jiwu Jing, Chinese Academy of Sciences, China Shriram Krishnamurthi, Brown University, USA Jie Li, University of Tsukuba, Japan Yingjiu Li, Singapore Management University, Singapore Dongdai Lin, Chinese Academy of Sciences, China Javier Lopez, University of Malaga, Spain Sjouke Mauw, University of Luxembourg, Luxembourg Catherine Meadows, Naval Research Laboratory, USA Chris Mitchell, Royal Holloway, UK Eiji Okamoto, University of Tsukuba, Japan Peng Ning, NC State University, USA Panagiotis Papadimitratos, EPFL Lausanne, Switzerland Alexander Pretschner, University of Kaiserslautern, Germany Michael Rusinowitch, LORIA-INRIA-Lorraine, France Andrei Sabelfeld, Chalmers University, Sweden Pierangela Samarati, University of Milan, Italy Shiuhpyng Shieh, National Chiao Tung University, Chinese Taipei Anna Squicciarini, Pennsylvania State University, USA Vijay Varadharajan, Macquarie University, Australia Dongyan Xu, Purdue University, USA Jianying Zhou, Institute for Infocomm Research, Singapore See: http://www.dacas.cn/asiaccs2010/ |
|