CALL FOR PAPERS
For the past twenty years the ACM Symposium on Applied Computing (SAC) has been a primary forum for applied computer scientists, computer engineers and application developers to gather, interact, and present their research. SAC is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP); its proceedings are published by ACM in both printed form and CD-ROM; they are also available on the web through the ACM Digital Library. More information about SIGAPP and past editions of SAC can be found at http://www.acm.org/sigapp
2006 Track on Computer Security (5th edition)
The proliferation of network computing and especially the ubiquity of the Internet has made security one of the key areas in modern computing. The fifth edition of the Security Track strengthens its aims at bringing together researchers in any applied issues of computer and information security. The list of issues is vast, ranging from protocols to usability issues .
Topics of interest include but are not limited to
- software security (protocols, operating systems, etc.)
- hardware security (smartcards, biometric technologies, etc.)
- mobile security (properties for/from mobile agents, etc.)
- network security (anti-virus, anti-hacker, anti-DoS tools, firewalls, real-time monitoring, etc.)
- alternatives to cryptography (steganography, etc.)
- security-specific software development practices (vulnerability testing, fault-injection resilience, etc.)
- privacy and anonimity (trust management, pseudonimity, identity management, etc.)
- safety and dependability issues (reliability, survivability, etc.)
- cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.)
- security management and usability issues (security configuration, policy management, usability trials etc.)
The best papers of the 2003 edition are published in a special issue on computer security of the Concurrency and Computation: Practice and Experience (Wiley), vol. 16, no.1, 2004. The best papers of the 2004 edition are being published in a special issue of the Journal of Computer Security (IOS). We plan to continue this practice on the basis of appropriateness of the submissions.
- Giampaolo BELLA
Dipartimento di Matematica e Informatica - Universita' di Catania
Viale A. Doria, 6
I-95125 Catania, (ITALY)
Phone: +39 095 7383050
Fax: +39 095 330094
School of Computing Science - University of Newcastle upon Tyne
Newcastle upon Tyne, NE1 7RU, (UK)
Phone: +44 191 2228972
Fax : +44 191 2228788
- Gail-Joon Ahn (Department of Software and Information Systems, University of North Caroline at Charlotte, USA)
- Arslan Broemme (Faculty of Computer Science, University of Magdeburg, Germany)
- David W Chadwick (Computing Laboratory, University of Kent, UK)
- Bruce Christianson (Faculty of Engineering & Information Sciences,
University of Hertfordshire, UK)
- Nancy Durgin (Sandia National Laboratories, USA)
- Simon Foley (Department of Computer Science, University College, Cork, Ireland)
- Cedric Fournet (Microsoft
Research, Cambridge, UK)
- Dieter Gollmann
(Technical University Hamburg, Germany)
- Stefanos Gritzalis (Department of Information and Communication Systems Engineering, University of the Aegean, Greece)
- Peter Honeyman (Center
for Information Technology Integration, University of Michigan, USA)
- Sokratis K Katsikas (Department of Information and Communication Systems Engineering, University of the Aegean, Greece)
- Helmut Kurth (ATSEC,
- Volkmar Lotz (SAP
- Heiko Mantel (ETH Zuerich, Switzerland)
- Chris Mitchell (Royal Holloway, University of London, UK)
- David von Oheimb (Siemens
CT IC, Munich, Germany)
- Pierangela Samarati (Department of Information Technology, University of Milan, Italy)
- Vitaly Shmatikov (SRI International, USA)
- Kymie Tan (Department of Computer Science, Carnegie-Mellon University, USA)
The submission guidelines must be strictly followed for a paper to be considered.
Original papers from the above mentioned or other related areas will
be considered. Only full papers about original and unpublished research
are sought. Parallel submission to other conferences or other tracks of
SAC 2006 is forbidden. Each paper must be BLIND in the sense that it
must only include its title but not mention anything about its authors.
Self-reference must be blind too. The body of the paper must not exceed
15 pages using 11 point font and 1 inch margins on all four sides on
letter size paper. Papers failing to comply with length limitations
immediate rejection. Each submission should be formatted using LaTeX
"article" style. All papers must be submitted by 3 September 2005.
Submission is entirely mechanised by the eCMS paper management tool. The submission page is available here, where authors must first register their own account by obtaining a password, and then follow the instructions. For any problems with the system, you are welcome to email Jeff Allen (firstname.lastname@example.org).
Review and publication of accepted papers
Each paper will be fully refereed and undergo a blind review process by at least three referees. Anyone wishing to review papers for the Security Track should email the Track Chairs for consideration.
Accepted papers shall be formatted using the conference specific LaTeX style, which can be obtained from the symposium web page. Using this style, which is two-column, accepted papers must fit within five (5) pages, with the option to add a maximum of three (3) more pages at additional expenses.
Accepted papers will be published in the ACM SAC 2006 proceedings. Some papers may only be accepted as poster papers, and will be published as extended 2-page abstracts in the proceedings. According to the authors' guidelines, which can be obtained from the symposium web page, at least one author per paper must register before their paper is included in the proceedings.
- 3 September 2005: Submission of papers
- 15 October 2005: Notification of Acceptance/Rejection
- 5 November 2005: Camera-Ready copies of accepted papers
- 23-27 April 2006: SAC 2006 takes place