lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 1 Jun 2009 15:42:37 -0000
Subject: ACSAC 2009 submissions due June 8 and June 10 (extended)

ACSAC 2009: Deadline extended (panels June 10; papers, case studies, workshops, tutorials: June 8)

25th Annual Computer Security Applications Conference (ACSAC)
December 7-11, 2009
Honolulu, Hawaii

Our website is now open for submissions:

ACSAC is an internationally recognized forum where practitioners, researchers,
and developers in information system security meet to learn and to exchange
practical ideas and experiences. If you are developing practical solutions to
problems relating to network, system and information security, the you should
consider submitting your work to ACSAC and attending in December.

We are soliciting submissions in a number of different categories.

Due June 8, 2009:
* Technical Track: peer-reviewed papers
* Case Studies: practical experience reports from applying security
* Tutorials: in depth seminars on current security topics
* Workshops: on up to date hot topics

Due June 10, 2009:
* Panels: proposals for interactive panels

Due September 18, 2009:
* Posters: new and innovative preliminary work
* Works in Progress: works in progress, not yet ready for publishing

Detailed submission information for papers, panels, tutorials,
workshops, case studies, posters, works in progress, and exhibitor information
can be found at

Topics of interest include, but are not limited to:
* access control
* applied cryptography
* audit and audit reduction
* biometrics
* certification and accreditation
* cybersecurity
* database security
* denial of service protection
* distributed systems security
* electronic commerce security
* enterprise security management
* forensics
* identification & authentication
* identify management
* incident response planning
* information survivability
* insider threat protection
* integrity
* intellectual property rights
* intrusion detection
* mobile and wireless security
* multimedia security
* operating systems security
* peer-to-peer security
* privacy and data protection
* product evaluation/compliance
* risk/vulnerability assessment
* securing cloud infrastructures
* security engineering and management
* security in IT outsourcing
* service oriented architectures
* software assurance
* trust management
* virtualization security
* VOIP security
* Web 2.0/3.0 security

Carrie Gates
CA Labs, USA

Charles Payne
Adventium Labs, USA

Michael Franz
University of California, Irvine, USA

This call for participation and additional information about the conference
can be found at

ACSAC is sponsored by Applied Computer Security Associates (ACSA),
a group of professionals who are working to facilitate information
sharing among colleagues. We're an all-volunteer not-for-profit
organization.  Our postal address is 2906 Covington Road, Silver
Spring, MD  20910-1206.

Powered by blists - more mailing lists