SEC@SAC
The Security Track at the ACM Symposium on Applied Computing

SEC@SAC12
The 11th edition of the Computer Security track
at the 27th ACM Symposium on Applied Computing
26-30 March 2012, Riva del Garda (Trento), Italy

CALL FOR PAPERS

The Symposium 

For the past twenty-seven years, the ACM Symposium on Applied Computing has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the world. SAC 2012 is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP), and is hosted by The Microsoft Research -- University of Trento, Trento, Italy.

For the past twenty-seven years the ACM Symposium on Applied Computing (SAC) has been a primary forum for applied computer scientists, computer engineers and application developers to gather, interact, and present their research. SAC is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP http://www.acm.org/sigapp); its proceedings are published by ACM in both printed form and CD-ROM; they are also available on the web through the ACM Digital Library http://www.acm.org/dl. More information about SIGAPP and past editions of SAC can be found at http://www.acm.org/sigapp

The Computer Security track (11th edition)

The Security Track reaches its eleventh edition this year, thus appearing among the most established tracks in the Symposium. The list of issues remains vast, ranging from protocols to work-flows.

Topics of interest include but are not limited to:

  • software security (protocols, operating systems, etc.)
  • hardware security (smartcards, biometric technologies, etc.)
  • mobile security (properties for/from mobile agents, etc.)
  • network security (anti-virus, anti-hacker, anti-DoS tools, firewalls, real-time monitoring, etc.)
  • alternatives to cryptography (steganography, etc.)
  • security-specific software development practices (vulnerability testing, fault-injection resilience, etc.)
  • privacy and anonymity (trust management, pseudonymity, identity management, electronic voting, etc.)
  • safety and dependability issues (reliability, survivability, etc.)
  • cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.)
  • security management and usability issues (security configuration, policy management, usability trials etc.)
  • workflow and service security (business processes, web services, etc.)
  • security in cloud computing and virtualised environments

Important Dates

Sunday 4th September 2011, midnight CEST (extended, firm) Submission of full papers
12 October 2011 Notification of Acceptance/Rejection
2 November 2011 Camera-Ready copies of accepted papers
March 2012 SAC 2012 takes place

Best Papers

The best papers of the 2003 edition are published in a special issue of Concurrency and Computation: Practice and Experience (Wiley) , vol. 16, no.1, 2004. The best papers of the 2004 edition are published in a special issue of the Journal of Computer Security (IOS) , vol. 13, no.5, 2005. The best papers of the 2006 edition are published in a special issue of the Journal of Computer Security (IOS) , vol. 17, no.3, 2009.

This practice will be continued on the basis of appropriateness of the submissions.

Track Program Chairs

  • Giampaolo BELLA
    Dipartimento di Matematica e Informatica, Università di Catania, Italy.
  • Helge JANICKE
    Software Technology Research Laboratory, De Montfort University, UK.
  • Alessandro SORNIOTTI
    IBM Research Lab (Zurich)

Review and publication of accepted papers

Each paper will be fully refereed and undergo a blind review process by at least three referees. Accepted papers will be published in the ACM SAC 2012 proceedings. Some papers may only be accepted as poster papers, and will be published as extended 2-page abstracts in the proceedings. According to the authors' guidelines, which can be obtained from the symposium web page, at least one author per paper must register before their paper is included in the proceedings.