[ISN] ACSAC Tech Blitz Call for Papers
isn at c4i.org
Tue Aug 16 02:18:19 EDT 2005
Forwarded from: ACSAC Announcement List <announce-admin at acsac.org>
Call For Papers
21st Annual Computer Security Applications Conference
Technology Blitz Session
December 5-9, 2005
ACSAC is an internationally recognized forum where practitioners,
researchers, and developers in information system security meet to learn
and to exchange practical ideas and experiences.
The Technology Blitz Session is a fast-paced forum for disseminating
leading edge security solutions quickly without the necessity for lengthy
dissolution. Each abbreviated work is be summarized in a 10 minute
presentation followed by a 5 minute question and answer period during the
conference. Thus, allowing for rapid articulation and immediate feedback
from academic and industrial colleagues.
Prospective authors are invited to submit extended abstracts for peer
review. Accepted abstracts and presentation slides and will be published on
the ACSAC web site after the conference.
Successful Technology Blitz extended abstract submissions represent the
most current activities in practical security research and are no more than
2-3 pages in length using a standard IEEE format (about 1800 words in
length). Papers should describe only the main technical innovations, any
accomplishments to date and lessons learned.
* Open submissions Now
* Submission due date September 9
* Acceptance notification October 16
* Conference presentations December 6
Detailed submission information is at:
Technology Blitz topic areas include, but are not limited to the following
list. Special consideration will be given to extended abstracts that
discuss system implementation, deployment and lessons learned.
* Access control
* Applied cryptography
* Audit and audit reduction
* Certification and accreditation
* Database Security
* Denial of service protection
* Defensive information warfare
* Electronic commerce security
* Enterprise Security
* Firewalls and other boundary control devices
* Identification and Authentication
* Information Survivability
* Insider threat protection
* Intellectual property rights protection
* Incident response planning
* Intrusion detection and event correlation
* Middleware and distributed systems security
* Operating systems security
* Security engineering
* Security management
* Security services
* Security standards and their application
* Wireless Security
Session Committee (tbc_chair at acsac.org)
- Paul Jardetzky, Independent Consultant (Chair)
- Jeremy Epstein, webMethods
- Timothy Roscoe, Intel Research
- Pierangela Samarati, University of Milan
You are receiving this notice because you joined the ACSAC email
notification list at http://www.acsac.org/join_ml.html. You can unsubscribe
there if you wish.
You can help ACSAC reach people who might benefit from this information.
Feel free to forward this message with a personal note to your friends and
colleagues. They can sign up at the above URL.
ACSAC is sponsored by Applied Computer Security Associates, a
not-for-profit all-volunteer Maryland corporation. Our postal address is
2906 Covington Road, Silver Spring, MD 20910-1206.
This information is provided in compliance with the CAN-SPAM Act of 2003.
More information about the ISN