| |||||||||||
CCS 2014 : 9th ACM Symposium on Information, Computer and Communications Security | |||||||||||
Link: http://asiaccs2014.nict.go.jp/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then ASIACCS has been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), Seoul (2012), and Hangzhou (2013).
ASIACCS 2014 is the ninth conference of the series, and will be held in Kyoto, Japan, a city renowned for its historic relics and natural beauty. Kyoto was (and some say still is a) capital of Japan for over a millennium, and contains many sites of cultural significance, including some of the most famous temples and shrines in Japan as well as imperial palaces and gardens. In addition, Kyoto is home to Nintendo among many other computer companies. ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2014 include, but are not limited to: - Access control - Accounting and audit - Anonymity - Applied cryptography - Authentication - Cloud computing security - Data and application security - Digital forensics - Embedded systems security - Formal methods for security - Hardware-based security - Inference control and disclosure - Intrusion detection - Key management - Malware and botnets - Mobile computing security - Network security - Operating system security - Privacy-enhancing technology - Security architectures - Security metrics - Software security - Trusted computing - Usable security and privacy - Web security - Wireless security |
|