from every continent, the (record number!) 61 submissions were included
in a blind
process that involved more than 28 reviewers (composed of PC members
delegates) from many different institutions. The reviewers did an
job and the whole process generated more than 190 reviews – each paper
was reviewed by at least 3 reviewers. Based on the reviewers' reports
general ACM SAC guidelines for evaluation of submissions, only 10
accepted, that is a tough acceptance rate of 16%, among the lowest in
the whole Symposium. Contents cover various aspects of applied
security. This year's programme is divide into two sessions, chaired by
the track chair.
- Szabo et al. identify and counter a new group of worms that target specific computers where abnormal events took place.
- Li and Guo evaluate an innovative technique to detect with moderate computational cost a variety of network anomalies.
- Huang et al. advance an architectural revolution for the Internet in order to satisfy privacy concerns such as anonymity and identity management.
- Onoue et al. publish a method to control the execution of system calls outside virtual machines, attaining a sort of layered management.
- Abbes et al. tackle the stringent problem of firewall configuration by an intelligent system to detect inconsistencies in firewall rules.
- Colantonio et al. introduce a convincing cost metric for the administration of role-based access control systems.
- Crampton and Khambhammettu elaborate on the problem of delegation in the context of workflow execution models.
- Sarmenta et al. prototype an original type of digital certificate that only requires a very light infrastructure to be reliable.
- Kemalis and Tzouramanis propose a novel specification-based methodology to detect SQL-injection vulnerabilities.
- Zuquete and Almeida develop the architecture of an existing voting scheme to enhance its anonymity goals.