The Security Track at the ACM Symposium on Applied Computing

The 12th edition of the Computer Security track
at the 28th ACM Symposium on Applied Computing
18-22 March 2013, Coimbra, Portugal


The Symposium 

For the past twenty-eight years, the ACM Symposium on Applied Computing has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the world. SAC 2013 is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP; its proceedings are published by ACM in both printed form and CD-ROM; they are also available on the web through the ACM Digital Library More information about SIGAPP and past editions of SAC can be found at

The Computer Security track (12th edition)

The Security Track reaches its twelfth edition this year, thus appearing among the most established tracks in the Symposium. The list of issues remains vast, ranging from protocols to work-flows.

Topics of interest include but are not limited to:

  • software security (protocols, operating systems, etc.)
  • hardware security (smartcards, biometric technologies, etc.)
  • mobile security (properties for/from mobile agents, etc.)
  • network security (anti-DoS tools, firewalls, real-time monitoring, mobile networks, sensor networks, etc.)
  • alternatives to cryptography (steganography, etc.)
  • security-specific software development practices (vulnerability testing, fault-injection resilience, etc.)
  • privacy and anonymity (trust management, pseudonymity, identity management, electronic voting, etc.)
  • safety and dependability issues (reliability, survivability, etc.)
  • cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.)
  • security management and usability issues (security configuration, policy management, usability trials etc.)
  • workflow and service security (business processes, web services, etc.)
  • security in cloud computing and virtualised environments

Important Dates

28 September 2012, midnight CEST (extended, firm) Submission of full papers
10 November 2012 Notification of Acceptance/Rejection
30 November 2012 Camera-Ready copies of accepted papers
18-22 March 2013 SAC 2013 takes place

Best Papers

The best papers of the 2003 edition are published in a special issue of Concurrency and Computation: Practice and Experience (Wiley) , vol. 16, no.1, 2004. The best papers of the 2004 edition are published in a special issue of the Journal of Computer Security (IOS) , vol. 13, no.5, 2005. The best papers of the 2006 edition are published in a special issue of the Journal of Computer Security (IOS) , vol. 17, no.3, 2009.

This practice will be continued on the basis of appropriateness of the submissions.

Track Program Chairs

  • Giampaolo BELLA
    Dipartimento di Matematica e Informatica, Università di Catania, Italy.
  • Helge JANICKE
    Software Technology Research Laboratory, De Montfort University, UK.
  • Graham STEEL
    INRIA, France

Review and publication of accepted papers

Each paper will be fully refereed and undergo a blind review process by at least three referees. Accepted papers will be published in the ACM SAC 2013 proceedings. Some papers may only be accepted as poster papers, and will be published as extended 2-page abstracts in the proceedings. According to the authors' guidelines, which can be obtained from the symposium web page, at least one author per accepted paper must register before the paper is included in the proceedings. Each accepted paper MUST be presented by an author or a proxy at the venue: this is a requirement for the paper to be part of the ACM/IEEE digital library

Student research abstract competition

Graduate students are invited to submit research abstracts (minimum of 2-page and maximum of 4-page) following the instructions published at SAC 2013 website. Submission of the same abstract to multiple tracks is not allowed.