*******************************************************************
The deadline for paper submission has been extended to June 8, 2008
*******************************************************************

[Apologies if you receive multiple copies of this message]


--------------------------
2nd Call For Papers
--------------------------

24th Annual Computer Security Applications Conference (ACSAC)
December 8-12, 2008
Anaheim, California

http://www.acsac.org


IMPORTANT DATES

Paper Submission due:    June 8, 2008 *hard*
                         midnight Samoa Time (UTC-11)

Acceptance notification: August 18, 2008

Final papers due:        September 18, 2008


ACSAC is an internationally recognized forum where practitioners,
researchers, and developers in information system security meet to learn
and to exchange practical ideas and experiences.  Papers offering novel
contributions in any aspect of computer and application security are
solicited. Papers may present technique, applications, or practical
experience, or theory that has a clear practical impact. Papers are
encouraged on technologies and methods that have been demonstrated to be
useful for improving information systems security and that address
lessons from actual application.
Topics of interest include, but are not limited to:
    * access control
    * applied cryptography
    * audit and audit reduction
    * biometrics
    * boundary control devices
    * certification and accreditation
    * database security
    * defensive information warfare
    * denial of service protection
    * electronic commerce security
    * enterprise security
    * forensics
    * identification and authentication
    * identity management
    * incident response planning
    * information survivability
    * insider threat protection
    * integrity
    * intellectual property rights protection
    * intrusion detection
    * malware
    * multimedia security
    * operating systems security
    * peer-to-peer security
    * privacy and anonymity
    * product evaluation criteria and compliance
    * risk/vulnerability assessment
    * secure location services
    * security engineering and management
    * security in IT outsourcing
    * service oriented architectures
    * software assurance
    * trust management
    * virtualization security
    * voip security

Paper submissions:  Submitted papers must not substantially overlap
papers that have been published or that are simultaneously submitted to
a journal or a conference with proceedings. Papers should be at most 15
pages including the bibliography and well-marked appendices (using
11-point font and reasonable margins on letter-size paper). Committee
members are not required to read the appendices, and so the paper should
be intelligible without them.
All submissions should be appropriately anonymized (i.e., papers should
not contain author names or affiliations, or obvious citations).
Submissions are to be made to the submission web site at
http://www.acsac.org.
Only pdf or postscript files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the deadline
of June 8, 2008.
Authors of accepted papers must guarantee that their papers will be
presented at the conference. Camera-ready format for accepted submissions
will be determined at a later date by the IEEE.
(In the past, IEEE required two column, using 10-point font, and not to
exceed 10 pages.  ACSAC has determined that submissions formatted as 15
pgs, single column, 11-point font, should fall within 10 pages when
reformatted according to those requirements.)

Proceedings will be published by the IEEE Computer Society.

Other submissions: Detailed submission information for panels,
tutorials, workshops, case studies, work in progress, and exhibitor
information can be found at http://www.acsac.org/cfp.


GENERAL CHAIR
Cristina Serban
AT&T, USA

PROGRAM CHAIR
Pierangela Samarati
University of Milan, Italy

PROGRAM CO-CHAIR
Charles Payne
Adventium Labs, USA

PROGRAM COMMITTEE:
Claudio Ardagna, University of Milan, Italy
Vijay Atluri, Rutgers University, USA
Tuomas Aura, Microsoft Research, UK
Konstantin Beznosov, University of British Columbia, Canada
Marco Casassa-Mont, HP Bristol, UK
Marc Dacier, Eurecom Institute, France
Robert Deng, Singapore Management University, Singapore
Mary Denz, Air Force Research Laboratory, USA
Andre dos Santos, U. of Puerto Rico-Mayaguez, Puerto Rico
Anas Abou El Kalam, University of Toulouse, France
Philip W. L. Fong, University of Regina, Canada
Sara Foresti, University of Milan, Italy
Vinod Ganapathy, Rutgers University, USA
Carrie Gates, CA Labs, USA
Dieter Gollmann, Hamburg University of Technology, Germany
Steven Greenwald, Independent Consultant, USA
Dimitris Gritzalis, AUEB, Greece
Tom Haigh, Adventium Labs, USA
Wesley Higaki, Symantec Corporation, USA
Cynthia Irvine, Naval Postgraduate School, USA
Sushil Jajodia, George Mason University, USA
Hongxia Jin, IBM Almaden Research Center, USA
Wenke Lee, Georgia Institute of Technology, USA
Ulf Lindqvist, SRI International, USA
Peng Liu, Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
John Mc Dermott, Naval Research Laboratory, USA
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Marco Pistoia, IBM Watson, USA
Lillian Rostad, Norwegian U. of Science and Tech., Norway
Reiner Sailer, IBM T.J. Watson Research Center, USA
Christoph Schuba, Sun Microsystems Inc., USA
Fabio Scotti, University of Milan, Italy
Kent Seamons, Brigham Young University, USA
Anoop Singhal, National Institute of Standards, USA
Randy Smith, Boeing, USA
Angelos Stravoru, George Mason University, USA
Vipin Swarup, MITRE, USA
Dan Thomsen, Cyber Defence Agency, USA
Patrick Traynor, Penn State University, USA
V.N. Venkatakrishnan, University of Illinois at Chicago, USA
Giovanni Vigna, University of California, USA
David Whyte, CSEC, Canada
Alex Yasinac, Florida State University, USA


----------------------------------------------------------------------
This call for papers and additional information about the conference
can be found at http://www.acsac.org/cfp
----------------------------------------------------------------------

ACSAC is sponsored by Applied Computer Security Associates (ACSA),
a group of professionals who are working to facilitate information
sharing among colleagues. We're an all-volunteer not-for-profit
organization.  Our postal address is 2906 Covington Road, Silver
Spring, MD  20910-1206.
No virus found in this outgoing message.
Checked by AVG.
Version: 8.0.100 / Virus Database: 269.24.1/1470 - Release Date: 28/05/2008 7.20
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to