Statistics and General Information about SEC@SAC 2011.
The Security Track has reached its tenth year at the 2011 Symposium on Applied Computing, appearing among its most established tracks.
Originating from every continent, the 41 submissions were included in a blind review process that involved 16 reviewers from many different institutions. The reviewers did an outstanding job and the whole process generated more than 120 reviews. Each paper was reviewed by at least 3 reviewers. Based on the reviewers' reports and the general ACM SAC guidelines for evaluation of submissions, only 9 papers were accepted, corresponding to an acceptance rate of 21%, among the lowest in the whole Symposium. Contents cover various aspects of applied computer security. This year's programme has been divided into two sessions, chaired by the track chair, where the following papers have been presented:
- Karsten Sohr et.al presented aspects of security of java-based mobile phones.
- Jan Cederquist et.al analysed fairness constraints for the Dolev-Yao attacker model
- Madeline González Muñiz et.al addressed perennial message recognition protocols without using PPK cryptography
- Orestis Kostakis et.al improved call-graph comparisons using simulated annealing
- Leilei Shi et.al presented a natural language interface to author access control policies
- Martin Johns et.al showed how to protect against session fixation attacks
- Wei Wang et.al presented how web attacks can be detected using HTTP exemplar extraction.
- Hongxia Jin et.al contributed "Efficient Traitor Tracing for Clone Attack in Content Protection"
- Yan Zhu et.al presented a framework to audit service integrity in outsourced cloud storages