CALL FOR PAPERS
For the past twenty years the ACM Symposium on Applied Computing (SAC) has been a primary forum for applied computer scientists, computer engineers and application developers to gather, interact, and present their research. SAC is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP); its proceedings are published by ACM in both printed form and CD-ROM; they are also available on the web through the ACM Digital Library. More information about SIGAPP and past editions of SAC can be found at http://www.acm.org/sigapp
2007 Track on Computer Security (6th edition)
The proliferation of network computing and especially the ubiquity of the Internet has made security one of the key areas in modern computing. The fifth edition of the Security Track strengthens its aims at bringing together researchers in any applied issues of computer and information security. The list of issues is vast, ranging from protocols to usability issues .
Topics of interest include but are not limited to
- software security (protocols, operating systems, etc.)
- hardware security (smartcards, biometric technologies, etc.)
- mobile security (properties for/from mobile agents, etc.)
- network security (anti-virus, anti-hacker, anti-DoS tools, firewalls, real-time monitoring, etc.)
- alternatives to cryptography (steganography, etc.)
- security-specific software development practices (vulnerability testing, fault-injection resilience, etc.)
- privacy and anonimity (trust management, pseudonimity, identity management, etc.)
- safety and dependability issues (reliability, survivability, etc.)
- cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.)
- security management and usability issues (security configuration, policy management, usability trials etc.)
The best papers of the 2003 edition are published in a special issue of Concurrency and Computation: Practice and Experience (Wiley), vol. 16, no.1, 2004.
The best papers of the 2004 edition are published in a special issue of the Journal of Computer Security (IOS), vol. 13, no.5, 2005.
The best papers of the 2006 edition are being reviewed to be published in an upcoming special issue of the Journal of Computer Security (IOS).
This practice will be continued on the basis of appropriateness of the submissions.
- Giampaolo BELLA
Dipartimento di Matematica e Informatica - Universita' di Catania
Viale A. Doria, 6
I-95125 Catania, (ITALY)
Phone: +39 095 7383050
Fax: +39 095 330094
School of Computing Science - University of Newcastle upon Tyne
Newcastle upon Tyne, NE1 7RU, (UK)
Phone: +44 191 2228972
Fax : +44 191 2228788
- Gail-Joon Ahn (Department of Software and Information Systems, University of North Caroline at Charlotte, USA)
- Arslan Broemme (Faculty of Computer Science, University of Magdeburg, Germany)
- David W Chadwick (Computing Laboratory, University of Kent, UK)
- Bruce Christianson (Faculty of Engineering & Information Sciences, University of Hertfordshire, UK)
- Nancy Durgin (Sandia National Laboratories, USA)
- Dieter Gollmann
(Hamburg University of Technology, Germany)
- Stefanos Gritzalis (Department of Information and Communication Systems Engineering, University of the Aegean, Greece)
- Sokratis K Katsikas (Department of Information and Communication Systems Engineering, University of the Aegean, Greece)
- Helmut Kurth (ATSEC, Germany)
- Chris Lesniewski-Laas (MIT,
- Volkmar Lotz (SAP Research, France)
- John McDermott (Naval Research Lab, USA)
- Chris Mitchell (Royal Holloway, University of London, UK)
- Steven J. Murdoch (University of Cambridge Computer Laboratory, UK)
- David von Oheimb (Siemens Corporate Technology, Munich, Germany)
- Dusko Pavlovic (Kestrel
- Pierangela Samarati (Department of Information Technology, University of Milan, Italy)
- Kymie Tan (Department of Computer Science, Carnegie-Mellon University, USA)
- Jianying Zhou (Institute for Infocomm Research,
The submission guidelines must be strictly followed for a paper to be considered.
Original papers from the above mentioned or other related areas will
be considered. Only full papers about original and unpublished research
are sought. Parallel submission to other conferences or other tracks of
SAC 2007 is forbidden. Each paper must be BLIND in the sense that it
must only include its title but not mention anything about its authors.
Self-reference must be blind too. All submissions must be formatted
using the ACM conference-specific
LaTeX style, which can be obtained from the symposium web
page.The standard extension of a submission in the stated format is
5 pages (approximately 5000 words). Longer papers (up to 8 pages
maximum) will imply an additional charge. All papers must be submitted
by 8 September 2006.
symposium-wide paper management system for SAC 2007,
whose management is beyond the track chairs' control..
Review and publication of accepted papers
Each paper will be fully refereed and undergo a blind review process by at least three referees. Anyone wishing to review papers for the Security Track should email the Track Chairs for consideration.
Accepted papers will be published in the ACM SAC 2007 proceedings. Some papers may only be accepted as poster papers, and will be published as extended 2-page abstracts in the proceedings. According to the authors' guidelines, which can be obtained from the symposium web page, at least one author per paper must register before their paper is included in the proceedings.
- 8 September 2006: Submission of papers
- 16 October 2006: Notification of Acceptance/Rejection
- 30 October 2006: Camera-Ready copies of accepted papers
- 11-15 March 2007: SAC 2007 takes place