Note: this blog is a mirror of my HP Labs Blog, on the same topic, accessible at: http://h30507.www3.hp.com/t5/Research-on-Security-and/bg-p/163

Tuesday, April 22, 2008

Announcing ACSAC 2008

This community might be interested in knowing that the Call-for-Paper for the 24th Annual Computer Security Application Conference (ACSAC 2008) is now available online – the submission deadline is June, 1st:

“ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. Papers offering novel contributions in any aspect of computer and application security are solicited. Papers may present technique, applications, or practical experience, or theory that has a clear practical impact. Papers are encouraged on technologies and methods that have been demonstrated to be useful for improving information systems security and that address lessons from actual application.

Topics of interest include, but are not limited to:

- Access control
- Applied cryptography
- Audit and audit reduction
- Biometrics
- Boundary control devices
- Certification and accreditation
- Database security
- Defensive information warfare
- Denial of service protection
- Distributed systems security
- Electronic commerce security
- Enterprise security
- Forensics
- Identification and authentication
- Identity management
- Incident response planning
- Information survivability
- Insider threat protection
- Integrity
- Intellectual property rights protection
- Intrusion detection
- Malware
- Mobile and wireless security
- Multimedia security
- Operating systems security
- Peer-to-peer security
- Privacy and data protection
- Product evaluation criteria and compliance
- Risk/vulnerability assessment
- Secure location services
- Security engineering and management
- Security in IT outsourcing
- Service Oriented Architectures
- Software assurance
- Trust management
- Virtualization security
- VoIP security”

--- NOTE: my original HP blog can be found here ---

No comments: