[Apologies if you receive multiple copies of this message]

CALL FOR PAPERS

23rd ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC)
December 10-14, 2007 - Miami Beach, Florida, USA
http://www.acsac.org

--------------------------------------------------------------------------
* Due to several requests the deadline is extended to June 10, 2007 (firm) 
  for technical papers, panels, tutorials, and workshops.
* Deadline is extended to June 17 for case studies only.
* Deadline is September 9 for WIP (works in progress reports).
--------------------------------------------------------------------------

ACSAC is an internationally recognized forum where practitioners,
researchers, and developers in information system security meet to
learn and to exchange practical ideas and experiences.  Papers
offering novel contributions in any aspect of computer and application
security are solicited. Papers may present technique, applications, or
practical experience, or theory that has a clear practical
impact. Papers are encouraged on technologies and methods that have
been demonstrated to be useful for improving information systems
security and that address lessons from actual application.  Topics of
interest include, but are not limited to:

* access control                    
* applied cryptography              
* audit & audit reduction
* biometrics                        
* boundary control devices          
* certification & accreditation     
* database security                 
* denial of service protection      
* defensive information warfare     
* electronic commerce security      
* enterprise security               
* forensics                         
* identification & authentication   
* identity management               
* information survivability         
* insider threat protection         
* integrity                         
* incident response planning        
* intellectual property rights protection
* intrusion detection & event correlation
* malware
* middleware & distributed systems security
* mobile & wireless security
* modeling & simulation related to security
* operating systems security
* peer-to-peer security
* privacy
* product evaluation criteria & compliance
* risk/vulnerability assessment
* secure location services
* security engineering & management
* security in IT outsourcing
* service oriented architectures
* software assurance
* trust management
* voip security

Paper submissions: Submitted papers must not substantially overlap
papers that have been published or that are simultaneously submitted
to a journal or a conference with proceedings.  Papers should be at
most 15 pages including the bibliography and well-marked appendices
(single column, using 11-point font, and reasonable margins on
letter-size paper).  Committee members are not required to read the
appendices, and so the paper should be intelligible without them.  All
submissions should be appropriately anonymized (i.e., papers should
not contain author names or affiliations, or obvious citations).
Submissions are to be made to the submission web site at
http://www.acsac.org. Only pdf or postscript files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of June 10, 2007. Authors of accepted papers must guarantee
that their papers will be presented at the conference.

Other submissions: Detailed submission information for panels,
tutorials, workshops, case studies, work in progress, and exhibitor
information can be found at http://www.acsac.org/cfp.

GENERAL CHAIR           
Cristina Serban         
AT&T, USA

PROGRAM CHAIR           
Pierangela Samarati     
University of Milan, Italy

PROGRAM CO-CHAIR        
Charles Payne           
Adventium Labs, USA

IMPORTANT DATES
Paper Submission due:    June 10, 2007 (NEW)
Acceptance notification: August 13, 2007
Final papers due:        September 13, 2007

PROGRAM COMMITTEE
Tuomas Aura, Microsoft Research, UK
Lujo Bauer, Carnegie Mellon University, USA
David E. Bell, Offthisweek, USA
Terry Benzel, University of Southern California, USA
Konstantin Beznosov, University of British Columbia, Canada
Rafae Bhatti, Florida International University, USA
Marc Dacier, Eurecom Institute, France
Sabrina De Capitani di Vimercati, University of Milan, Italy
Mary Denz, Air Force Research Laboratory, USA
Jan Eloff, Rand Afrikaans University, South Africa
Philip W.L. Fong, University of Regina, Canada
Sara Foresti, University of Milan, Italy
Michael Franz, University of California, USA
Carrie Gates, CA Labs, USA
Dieter Gollmann, Hamburg University of Technology, Germany
Steven Greenwald, Independent Consultant, USA
Tom Hinke, NASA Ames, USA
Tom Haigh, Adventium Labs, USA
Wesley Higaki, Symantec Corporation, USA
Cynthia Irvine, Naval Postgraduate School, USA
Sushil Jajodia, George Mason University, USA
Jan Jurjens, TU Munich, Germany
Myong Kang, Naval Research Laboratory, USA
Angelos Keromytis, Columbia University, USA
Wenke Lee, Georgia Institute of Technology, USA
Ulf Lindqvist, SRI International, USA
Peng Liu, Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Bryan Lyles, Telcordia Technologies, USA
Patrick McDaniel, Pennsylvania State University, USA
Jelena Mirkovic, University of Delaware, USA
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita di Bergamo, Italy
Joon S. Park, Syracuse University, USA
Lillian Rostad, Norwegian U. of Science and Tech., Norway
Reiner Sailer, IBM T.J. Watson Research Center, USA
Andre dos Santos, U. of Puerto Rico-Mayaguez, Puerto Rico
Christoph Schuba, Linkopings Universitet, Sweden
Kent Seamons, Brigham Young University, USA
Anoop Singhal, National Institute of Standards, USA
Carol Taylor, University of Idaho, USA
Dan Thomsen, Cyber Defence Agency, USA
Paul Van Oorschot, Carleton University, Canada
Giovanni Vigna, University of California, USA
Simon Wiseman, QinetiQ, USA
Diego Zamboni, IBM Zurich Research Lab., Switzerland

----------------------------------------------------------------------
This call for papers and additional information about the conference
can be found at http://www.acsac.org/cfp
----------------------------------------------------------------------

ACSAC is sponsored by Applied Computer Security Associates (ACSA),
a group of professionals who are working to facilitate information
sharing among colleagues. We're an all-volunteer not-for-profit
organization.  Our postal address is 2906 Covington Road, Silver
Spring, MD  20910-1206.
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to