Forwarded from: ACSAC Announcement List <announce-admin@private> ------------------- Call For Papers ------------------- 21st Annual Computer Security Applications Conference Technology Blitz Session December 5-9, 2005 Tucson, Arizona http://www.acsac.org/sub/tb.html ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. The Technology Blitz Session is a fast-paced forum for disseminating leading edge security solutions quickly without the necessity for lengthy dissolution. Each abbreviated work is be summarized in a 10 minute presentation followed by a 5 minute question and answer period during the conference. Thus, allowing for rapid articulation and immediate feedback from academic and industrial colleagues. Prospective authors are invited to submit extended abstracts for peer review. Accepted abstracts and presentation slides and will be published on the ACSAC web site after the conference. Successful Technology Blitz extended abstract submissions represent the most current activities in practical security research and are no more than 2-3 pages in length using a standard IEEE format (about 1800 words in length). Papers should describe only the main technical innovations, any accomplishments to date and lessons learned. Important Dates * Open submissions Now * Submission due date September 9 * Acceptance notification October 16 * Conference presentations December 6 Detailed submission information is at: http://www.acsac.org/sub/tb.html Technology Blitz topic areas include, but are not limited to the following list. Special consideration will be given to extended abstracts that discuss system implementation, deployment and lessons learned. * Access control * Applied cryptography * Audit and audit reduction * Biometrics * Certification and accreditation * Database Security * Denial of service protection * Defensive information warfare * Electronic commerce security * Enterprise Security * Firewalls and other boundary control devices * Forensics * Identification and Authentication * Information Survivability * Insider threat protection * Integrity * Intellectual property rights protection * Incident response planning * Intrusion detection and event correlation * Middleware and distributed systems security * Operating systems security * Privacy * Security engineering * Security management * Security services * Security standards and their application * Wireless Security Session Committee (tbc_chair@private) - Paul Jardetzky, Independent Consultant (Chair) - Jeremy Epstein, webMethods - Timothy Roscoe, Intel Research - Pierangela Samarati, University of Milan You are receiving this notice because you joined the ACSAC email notification list at http://www.acsac.org/join_ml.html. You can unsubscribe there if you wish. You can help ACSAC reach people who might benefit from this information. Feel free to forward this message with a personal note to your friends and colleagues. They can sign up at the above URL. ACSAC is sponsored by Applied Computer Security Associates, a not-for-profit all-volunteer Maryland corporation. Our postal address is 2906 Covington Road, Silver Spring, MD 20910-1206. This information is provided in compliance with the CAN-SPAM Act of 2003. _________________________________________ Attend ToorCon Sept 16-18th, 2005 Convention Center San Diego, California www.toorcon.org
This archive was generated by hypermail 2.1.3 : Mon Aug 15 2005 - 23:28:41 PDT