Liebe Mitglieder des FB Sicherheit,
anbei der Call-for-Papers zum 4. Computer Security Track bei der ACM SAC 2005. Ich bitte um freundliche Beachtung und Weitergabe an Interessierte.
Einreichungstermin: 6. September 2004 Veranstaltungstermin: 13.-17.März 2005
Mit freundlichen Grüßen David v.Oheimb
+------------------------------------------------------------------<><-+ | Dr. David von Oheimb Senior Research Scientist | | Siemens AG - CT IC 3 Phone: +49 89 636 41173 | | Otto-Hahn-Ring 6 Fax : +49 89 636 48000 | | D-81730 München, Germany EMail: David.von.Oheimb@siemens.com | | http://scd.siemens.de/db4/lookUp?tcgid=Z000ECRO http://ddvo.net/ | +----------------------------------------------------------------------+
CALL FOR PAPERS SAC 2005 The 20th ACM Symposium on Applied Computing 13-17 March 2005, Santa Fe, New Mexico, USA Track on Computer Security (4th edition)
SAC 2005 For the past eighteen years the ACM Symposium on Applied Computing (SAC) has been a primary forum for applied computer scientists, computer engineers and application developers to gather, interact, and present their research. SAC is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP); its proceedings are published by ACM in both printed form and CD-ROM; they are also available on the web through the ACM Digital Library. More information about SIGAPP and past editions of SAC can be found at http://www.acm.org/sigapp/
2005 Track on Computer Security (4th edition) The proliferation of network computing and especially the ubiquity of the Internet has made security one of the key areas in modern computing. The fourth edition of the Security Track strengthens its aims at bringing together researchers in any applied issues of computer and information security. The list of issues is vast, ranging from protocols to usability issues .
Topics of interest include but are not limited to
* software security (protocols, operating systems, etc.) * hardware security (smartcards, biometric technologies, etc.) * mobile security (properties for/from mobile agents, etc.) * network security (anti-virus, anti-hacker, anti-DoS tools, firewalls, real-time monitoring, etc.) * alternatives to cryptography (steganography, etc.) * security-specific software development practices (vulnerability testing, fault-injection resilience, etc.) * privacy and anonimity (trust management, pseudonimity, identity management, etc.) * safety and dependability issues (reliability, survivability, etc.) * cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.) * security management and usability issues (security configuration, policy management, usability trials etc.)
Best Papers The best papers of the 2003 edition are published in a special issue on computer security of the Concurrency and Computation: Practice and Experience (Wiley), vol. 16, no.1, 2004. The best papers of the 2004 edition are being published in a special issue of the Journal of Computer Security (IOS). We plan to continue this practice on the basis of appropriateness of the submissions.
Track Website The 2005 edition of the Security Track is the fourth of a successfull series, whose details are under http://www.dmi.unict.it/~giamp/sac/
* Giampaolo BELLA
Dipartimento di Matematica e Informatica - Universita' di Catania Viale A. Doria, 6 I-95125 Catania, (ITALY) Phone: +39 095 7383050 Fax: +39 095 330094 email: firstname.lastname@example.org
* Peter RYAN
School of Computing Science - University of Newcastle upon Tyne Newcastle upon Tyne, NE1 7RU, (UK) Phone: +44 191 2228972 Fax : +44 191 2228788 email: email@example.com
* Gail-Joon Ahn (Department of Software and Information Systems, University of North Caroline at Charlotte, USA) * Arslan Broemme (Faculty of Computer Science, University of Magdeburg, Germany) * David W Chadwick (IS Institute, University of Salford, UK) * Bruce Christianson (Faculty of Engineering & Information Sciences, University of Hertfordshire, UK) * Nancy Durgin (Sandia National Laboratories, USA) * Simon Foley (Department of Computer Science, University College, Cork, Ireland) * Cedric Fournet (Microsoft Research, Cambridge, UK) * Dieter Gollmann (Technical University Hamburg, Germany) * Stefanos Gritzalis (Department of Information and Communication Systems Engineering, University of the Aegean, Greece) * Peter Honeyman (Center for Information Technology Integration, University of Michigan, USA) * Sokratis K Katsikas (Department of Information and Communication Systems Engineering, University of the Aegean, Greece) * Markus Kuhn (Computer Laboratory, University of Cambridge, UK) * Heiko Mantel (ETH Zuerich, Switzerland) * Chris Mitchell (Royal Holloway, University of London, UK) * David von Oheimb (Siemens CT IC, Munich, Germany) * Pierangela Samarati (Department of Information Technology, University of Milan, Italy) * Vitaly Shmatikov (SRI International, USA) * Kymie Tan (Department of Computer Science, Carnegie-Mellon University, USA)
Submission Guidelines The submission guidelines must be strictly followed for a paper to be considered.
Original papers from the above mentioned or other related areas will be considered. Only full papers about original and unpublished research are sought. Parallel submission to other conferences or other tracks of SAC 2005 is forbidden. Each paper must be BLIND in the sense that it must only include its title but not mention anything about its authors. Self-reference must be blind too. The body of the paper must not exceed 4,000 words. Papers failing to comply with length limitations risk immediate rejection. Each submission should be formatted using LaTeX "article" style. All papers must be submitted by 3 September 2004.
Submission is entirely mechanised by the CRP tool (Conference Review Package -- Copyright © 2001 Univ. of Colorado). The submission page is available here, where authors must first register their own account by obtaining a password, and then follow the instructions.
Review and publication of accepted papers Each paper will be fully refereed and undergo a blind review process by at least three referees. Anyone wishing to review papers for the Security Track should email the Track Chairs for consideration.
Accepted papers shall be formatted using the conference specific LaTeX style, which can be obtained from the symposium web page. Using this style, which is two-column, accepted papers must fit within five (5) pages, with the option to add a maximum of three (3) more pages at additional expenses.
Accepted papers will be published in the ACM SAC 2005 proceedings. Some papers may only be accepted as poster papers, and will be published as extended 2-page abstracts in the proceedings. According to the authors' guidelines, which can be obtained from the symposium web page, at least one author per paper must register before their paper is included in the proceedings. Ackwnowledgements Special thanks to Luigi Toscano (firstname.lastname@example.org) for maintaining the installation of the CRP tool at Catania.
* 6 September 2004: Submission of papers * 15 October 2004: Notification of Acceptance/Rejection * 5 November 2004: Camera-Ready copies of accepted papers * 13-17 March 2005: SAC 2005 takes place