posted by user: heljanic || 10915 views || tracked by 19 users: [display]

SEC@SAC 2011 : Track on Computer Security @ The 26th ACM Symposium on Applied Computing

FacebookTwitterLinkedInGoogle

Link: http://www.dmi.unict.it/~giamp/sac
 
When Mar 21, 2011 - Mar 25, 2011
Where Tunghai University, Taichung, Taiwan
Submission Deadline Aug 24, 2010
Notification Due Oct 12, 2010
Final Version Due Nov 2, 2010
Categories    security   cyberlaw   cryptography   security management
 

Call For Papers


CALL FOR PAPERS SAC 2011
http://www.acm.org/conferences/sac/sac2011/

The 26th ACM Symposium on Applied Computing
21-25 March 2011, Tunghai University, Taichung, Taiwan
Track on Computer Security (10th edition)
http://www.dmi.unict.it/~giamp/sac


SAC 2011

For the past twentytwo years the ACM Symposium on Applied Computing
(SAC) has been a primary forum for applied computer scientists, computer
engineers and application developers to gather, interact, and present
their research. SAC is sponsored by the ACM Special Interest Group on
Applied Computing (SIGAPP (http://www.acm.org/sigapp)); its proceedings
are published by ACM in both printed form and CD-ROM; they are also
available on the web through the ACM Digital Library
(http://www.acm.org/dl). More information about SIGAPP and past editions
of SAC can be found at http://www.acm.org/sigapp


2011 Track on Computer Security (10th edition)

The Security Track reaches its tenth edition this year, thus appearing
among the most established tracks in the Symposium. The list of issues
remains vast, ranging from protocols to workflows.

Topics of interest include but are not limited to

* software security (protocols, operating systems, etc.)
* hardware security (smartcards, biometric technologies, etc.)
* mobile security (properties for/from mobile agents, etc.)
* network security (anti-virus, anti-hacker, anti-DoS tools,
firewalls, real-time monitoring, etc.)
* alternatives to cryptography (steganography, etc.)
* security-specific software development practices (vulnerability
testing, fault-injection resilience, etc.)
* privacy and anonymity (trust management, pseudonymity, identity
management, electronic voting, etc.)
* safety and dependability issues (reliability, survivability, etc.)
* cyberlaw and cybercrime (copyrights, trademarks, defamation,
intellectual property, etc.)
* security management and usability issues (security configuration,
policy management, usability trials etc.)
* workflow and service security (business processes, web services, etc.)


Important Dates

24 August 2010: Submission of full papers
12 October 2010: Notification of Acceptance/Rejection
2 November 2010: Camera-Ready copies of accepted papers
21-25 March 2011: SAC 2011 takes place


Best Papers

The best papers of the 2003 edition are published in a special issue of
Concurrency and Computation: Practice and Experience (Wiley)
(http://aspen.ucs.indiana.edu/CandCPandE/), vol. 16, no.1, 2004.
The best papers of the 2004 edition are published in a special issue of
the Journal of Computer Security (IOS)
(http://www.csl.sri.com/programs/security/jcs/), vol. 13, no.5, 2005.
The best papers of the 2006 edition are published in a special issue of
the Journal of Computer Security (IOS)
(http://www.csl.sri.com/programs/security/jcs/), vol. 17, no.3, 2009.
This practice will be continued on the basis of appropriateness of the
submissions.


Track Program Chairs

* Giampaolo BELLA (giamp@dmi.unict.it)
http://www.dmi.unict.it/~giamp/
Dipartimento di Matematica e Informatica, Universita' di Catania, Italy.
Software Technology Research Laboratory, De Montfort University, UK.

* Helge JANICKE (heljanic@dmu.ac.uk)
http://www.tech.dmu.ac.uk/~heljanic/
Software Technology Research Laboratory, De Montfort University, UK.

* Alessandro SORNIOTTI
http://www.eurecom.fr/people/sorniott.en.htm
Institut Eur├ęcom, France.


Program Committee

* Gail-Joon Ahn (Department of Computer Science and Engineering,
Arizona State University, USA)
* Arslan Broemme (Vattenfall, Germany)
* Iliano Cervesato (Carnegie Mellon University, Qatar)
* David W Chadwick (Computing Laboratory, University of Kent, UK)
* Bruce Christianson (Faculty of Engineering & Information Sciences,
University of Hertfordshire, UK)
* Simon Foley (Department of Computer Science, University College,
Cork, Ireland)
* Dieter Gollmann (TU Hamburg, Germany)
* Stefanos Gritzalis (Department of Information and Communication
Systems Engineering, University of the Aegean, Greece)
* Sokratis K Katsikas (Department of Technology Education &
Digital Systems, University of Piraeus, Greece)
* Helmut Kurth (ATSEC, Germany)
* Chris Lesniewski-Laas (MIT, USA)
* Volkmar Lotz (SAP Research, France)
* Fabio Martinelli (National Research Council, Italy)
* John McDermott (Naval Research Lab, USA)
* Chris Mitchell (Royal Holloway, University of London, UK)
* Dusko Pavlovic (Kestrel Institute, USA, & Oxford University, UK)
* Mark Ryan (School of Computer Science, University of Birmingham, UK)


Submission Guidelines

The submission guidelines must be strictly followed for a paper to be
considered.

Original papers from the above mentioned or other related areas will be
considered. Only full papers about original and unpublished research are
sought. Parallel submission to other conferences or other tracks of SAC
2011 is forbidden. Each paper must be BLIND in the sense that it must
only include its title but not mention anything about its authors.
Self-reference must be blind too. All submissions must be formatted
using the ACM conference-specific LaTeX style, which can be obtained
from the symposium web page (http://www.acm.org/conferences/sac/sac2011/).
The standard extension of a submission in the stated format is 6 pages.
Longer papers (up to 8 pages maximum) will imply an additional charge.
All papers must be submitted by *24 August 2010*.

There is a symposium-wide paper management system for SAC 2011, which
authors must use to submit their papers.
(https://www.softconf.com/b/sac2011/)


Review and publication of accepted papers

Each paper will be fully refereed and undergo a blind review process by
at least three referees.Accepted papers will be published in the ACM SAC
2011 proceedings. Some papers may only be accepted as poster papers, and
will be published as extended 2-page abstracts in the proceedings.
According to the authors' guidelines, which can be obtained from the
symposium web page (http://www.acm.org/conferences/sac/sac2011/), at
least one author per paper must register before their paper is included
in the proceedings.

Related Resources

SA-TTA 2021   The 9th track on Software Architecture: Theory, Technology, and Applications (SA-TTA) at the 36th ACM/SIGAPP Symposium On Applied Computing (SAC 2021)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
ICENT--EI Compendex, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
CCNC 2021   IEEE Consumer Communications & Networking Conference
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ITCC--Ei Compendex and Scopus 2021   ACM--2021 3nd International Conference on Information Technology and Computer Communications (ITCC 2021)--Ei Compendex, Scopus
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
ITCC--Ei and Scopus 2021   ACM--2021 3nd International Conference on Information Technology and Computer Communications (ITCC 2021)--Ei Compendex, Scopus