23rd Annual Computer Security Applications Conference
December 10-14, 2007
Miami Beach, Florida
http://www.acsac.org
Works in Progress Submission Information
The Works in Progress (WiP) session packs as many 5 minute presentations as
it can into one fast paced and popular session. These talks highlight the
most current work in both industry and academia, emphasizing goals and value
add, accomplishments to date, and future plans. Special consideration is
given to topics that discuss real life security experience, including system
implementation, deployment, and lessons learned.
When are WiP abstracts due?
September 8.
What should I propose a WiP on?
If you are developing practical solutions to problems relating to protecting
information technology environments, be it your country's information
infrastructure or a commercial enterprise, consider submitting an abstract
to the Annual Computer Security Applications Conference. This internationally
recognized conference provides a forum for experts in information system
security to exchange innovative ideas about solving these critical problems.
We are looking for Works in Progress that address just about any security
topic, including:
* Access control
* Applied cryptography
* Audit and audit reduction
* Biometrics
* Boundary control devices
* Network access control
* Certification and accreditation
* Database security
* Denial of service protection
* Defensive information warfare
* Electronic commerce security
* Enterprise security
* Forensics
* Identification and authentication
* Information survivability
* Insider threat protection
* Integrity
* Intellectual property rights protection
* Incident response
* Intrusion detection and event correlation
* Malware
* Middleware and distributed systems security
* Mobile and wireless security
* Modeling and simulation related to security
* Operating systems security
* Peer-to-peer security
* Privacy
* Risk/vulnerability assessment
* Product evaluation
* Security engineering and management
* Security for Service Oriented Architectures
* Security standards and their application
* Secure location services/anonymity
* Software assurance
* VoIP security
We are particularly interested in Works in Progress abstracts that share
real-life experiences, and discuss actual system or product implementation,
deployment, and lessons learned.
How do I submit an abstract?
Abstracts should be 1-2 type-written pages in length and should briefly
describe the objectives of the current work, any accomplishments to date,
and future plans. Abstracts should be sent as PDF files to [EMAIL PROTECTED]
Please make sure you include author information (name, affiliation, country)
in your email. Acceptance notifications will be sent out on October 1.
What happens if my submission gets accepted?
We will be delighted to have you present during the WiP session at the
conference. For this, you will need to register and pay for the conference,
attend it (much of the value of ACSAC and WiP are the informal interactions
that take place during the conference), and present during your allotted
5-minute time slot. We will publish your abstract (or slides, if you prefer)
on the conference web site (under the WiP section). Due to the late timeframe,
we cannot publish abstracts in the conference proceedings.
How do I get more information?
For additional information regarding Works in Progress, please contact the
WiP Chair at [EMAIL PROTECTED]
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers