SEC @ ACM SAC
Security Track @ ACM Symposium on Applied Computing

CALL FOR PAPERS SAC 2012

http://www.acm.org/conferences/sac/sac2012/

The 27th ACM Symposium on Applied Computing
March 2012, Microsoft Research - University of Trento, Trento, Italy
Track on Computer Security (11th edition)
http://www.dmi.unict.it/~giamp/sac

SAC 2012

For the past twenty-seven years, the ACM Symposium on Applied Computing has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the world. SAC 2012 is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP), and is hosted by The Microsoft Research -- University of Trento, Trento, Italy.

For the past twenty-seven years the ACM Symposium on Applied Computing (SAC) has been a primary forum for applied computer scientists, computer engineers and application developers to gather, interact, and present their research. SAC is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP http://www.acm.org/sigapp); its proceedings are published by ACM in both printed form and CD-ROM; they are also available on the web through the ACM Digital Library http://www.acm.org/dl. More information about SIGAPP and past editions of SAC can be found at http://www.acm.org/sigapp

2012 Track on Computer Security (11th edition)

The Security Track reaches its eleventh edition this year, thus appearing among the most established tracks in the Symposium. The list of issues remains vast, ranging from protocols to work-flows.

Topics of interest include but are not limited to:

  • software security (protocols, operating systems, etc.)
  • hardware security (smartcards, biometric technologies, etc.)
  • mobile security (properties for/from mobile agents, etc.)
  • network security (anti-virus, anti-hacker, anti-DoS tools, firewalls, real-time monitoring, etc.)
  • alternatives to cryptography (steganography, etc.)
  • security-specific software development practices (vulnerability testing, fault-injection resilience, etc.)
  • privacy and anonymity (trust management, pseudonymity, identity management, electronic voting, etc.)
  • safety and dependability issues (reliability, survivability, etc.)
  • cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.)
  • security management and usability issues (security configuration, policy management, usability trials etc.)
  • workflow and service security (business processes, web services, etc.)
  • security in cloud computing and virtualised environments

Important Dates

31 August 2011 Submission of full papers
12 October 2011 Notification of Acceptance/Rejection
2 November 2011Camera-Ready copies of accepted papers
25-29 March 2012 SAC 2012 takes place

Best Papers

The best papers of the 2003 edition are published in a special issue of Concurrency and Computation: Practice and Experience (Wiley) , vol. 16, no.1, 2004. The best papers of the 2004 edition are published in a special issue of the Journal of Computer Security (IOS) , vol. 13, no.5, 2005. The best papers of the 2006 edition are published in a special issue of the Journal of Computer Security (IOS) , vol. 17, no.3, 2009.

This practice will be continued on the basis of appropriateness of the submissions.

Track Program Chairs

Program Committee

  • Gail-Joon Ahn (Department of Computer Science and Engineering, Arizona State University, USA)
  • Arslan Broemme (Vattenfall, Germany)
  • Iliano Cervesato (Carnegie Mellon University, Qatar)
  • David W Chadwick (Computing Laboratory, University of Kent, UK)
  • Bruce Christianson (Faculty of Engineering & Information Sciences, University of Hertfordshire, UK)
  • Dieter Gollmann (TU Hamburg, Germany)
  • Stefanos Gritzalis (Department of Information and Communication Systems Engineering, University of the Aegean, Greece)
  • Helmut Kurth (ATSEC, Germany)
  • Volkmar Lotz (SAP Research, France)
  • Chris Mitchell (Royal Holloway, University of London, UK)
  • Dusko Pavlovic (Kestrel Institute, USA, & Oxford University, UK)
  • Simon Foley (Department of Computer Science, University College, Cork, Ireland)
  • Sokratis K Katsikas (Department of Technology Education & Digital Systems, University of Piraeus, Greece)
  • Chris Lesniewski-Laas (MIT, USA)
  • John McDermott (Naval Research Lab, USA)
  • Manuel Barbosa (Universidade do Minho, Portugal)
  • Graham Steel (INRA, France)
  • Gabriele Lenzini (University of Luxembourg)
  • Fabio Martinelli (National Research Council, Italy)

Review and publication of accepted papers

Each paper will be fully refereed and undergo a blind review process by at least three referees. Accepted papers will be published in the ACM SAC 2012 proceedings. Some papers may only be accepted as poster papers, and will be published as extended 2-page abstracts in the proceedings. According to the authors' guidelines, which can be obtained from the symposium web page http://www.acm.org/conferences/sac/sac2012/ , at least one author per paper must register before their paper is included in the proceedings.