[TYPES/announce] CFP: Computer Security track of the 30th ACM Symposium on Applied Computing

Sergio Maffeis maffeis at doc.ic.ac.uk
Thu Aug 28 09:16:53 EDT 2014


[ Submissions of full papers and graduate student abstracts
   are solicited for the ACM SAC security track.

   12 Sept deadline.

   Many of the topics can benefit from language-based and
   especially types-based approaches.  Work of the kind
   reflected on this mailing list is very welcome.]


                   SEC at SAC15

The 14th edition of the Computer Security track
at the 30th ACM Symposium on Applied Computing
13-17 April 2015, University of Salamanca, Spain

CALL FOR PAPERS

The Symposium

For the past twenty-eight years, the ACM Symposium on Applied Computing
has been a primary gathering forum for applied computer scientists,
computer engineers, software engineers, and application developers from
around the world. The SAC 2015 proceedings are published by ACM in both
printed form and CD-ROM; they are also available on the web through the
ACM Digital Library http://www.acm.org/dl.

The Computer Security track (14th edition)

The Security Track reaches its thirteenth edition this year, thus
appearing among the most established tracks in the Symposium. The list
of issues remains vast, ranging from protocols to work-flows.

Topics of interest include but are not limited to:

- software security (protocols, operating systems, etc.)
- hardware security (smartcards, biometric technologies, etc.)
- mobile security (properties for/from mobile agents, etc.)
- network security (anti-DoS tools, firewalls, real-time monitoring,
mobile networks, sensor networks, etc.)
- alternatives to cryptography (steganography, etc.)
- security-specific software development practices (vulnerability
testing, fault-injection resilience, etc.)
- privacy and anonymity (trust management, pseudonymity, identity
management, electronic voting, etc.)
- safety and dependability issues (reliability, survivability, etc.)
- cyberlaw and cybercrime (copyrights, trademarks, defamation,
intellectual property, etc.)
- security management and usability issues (security configuration,
policy management, usability trials etc.)
- workflow and service security (business processes, web services, etc.)
- security in cloud computing and virtualised environments.

Important Dates

12 September 2014	Submission of full papers
17 November 2014	Notification of Acceptance/Rejection
8 December 2014	Camera-Ready copies of accepted papers
15 December 2014	Author registration due
13-17 April 2015	SAC 2015 takes place

Publication

Accepted papers will be published in the ACM SAC 2015 proceedings. Some
papers may only be accepted as poster papers, and will be published as
extended 2-page abstracts in the proceedings. Graduate students are
invited to submit research abstracts (minimum of 2-page and maximum of
4-page). The best papers of the 2013 edition are being published in an
upcoming number of the International Journal of Information Security
(Springer). This practice will be continued on the basis of
appropriateness of the submissions.

Submission instructions and details of the Program Committee are
available online at
http://www.dmi.unict.it/~giamp/sac/cfp2015.php

Giampaolo Bella and Sergio Maffeis (Program Chairs)




More information about the Types-announce mailing list