posted by system || 14947 views || tracked by 31 users: [display]

CODASPY 2011 : 1st ACM Conference on Data and Application Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Conference on Data and Application Security and Privacy
 
Link: http://www.codaspy.org
 
When Feb 21, 2011 - Feb 23, 2011
Where San Antonio, Texas, USA
Submission Deadline Sep 24, 2010
Notification Due Nov 20, 2010
Final Version Due Dec 10, 2010
Categories    security   privacy
 

Call For Papers

ACM CODASPY 2011

Call for Papers

1st ACM Conference on Data and Application Security and Privacy
http://www.codaspy.org

February 21-23 2011
Hilton Palacio Del Rio, San Antonio, Texas

Announcement: ACM SIGSAC announces the creation of a new annual ACM Conference on Data and Applications Security. The inaugural conference will be held in February 2011 in San Antonio, Texas. With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learnt to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of
applications and systems throughout their lifecycle. Security concerns have
rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

Scope: Data and the applications that manipulate data are the crucial assets
in todayÕs information age. With the increasing drive towards availability of data and services anytime anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such
as social networking and social computing provide value by aggregating input
from numerous individual users and/or the mobile devices they carry with them and computing new information of value to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations and government agencies to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries and the dramatic failure of old-style approaches to information protection in government agencies in keeping information too secret to connect the dots. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain.

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the conference is to discuss novel exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts.

General Chair: Ravi Sandhu, Institute for Cyber Security (ICS), University of Texas at San Antonio

Program Chair: Elisa Bertino, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue U.

Local Arrangements Chair: Jeffrey Reich, Institute for Cyber Security (ICS), University of Texas at San Antonio

Important Dates:

Paper Submissions: September 15th 2010
Notification: November 20th 2010
Camera Ready: December 10th 2010

Program Committee:

Gail-Joon Ahn Arizona State University
Lujo Bauer Carnegie Mellon University
Barbara Carminati University of Insubria
Isabel Cruz University of Illinois at Chicago
Elena Ferrari University of Insubria
Gabriel Ghinita Fermi Labs
Carl Gunter University of Illinois at Urbana-Champaign
Murat Kantarciouglu University of Texas at Dallas
GŸnter Karjoth IBM Research (Zurich)
Anupam Joshi University of Maryland at Baltimore County
Peng Liu The Pennsylvania State University
Wenbo Mao EMC
Sharad Merhotra University of California at Irvine
Gunther Pernul University of Regensburg
Ning Shang Microsoft
Elaine Shi PARC
Philippe Pucheral University of Versailles
Dan Thomsen Sandia National Labs
Bhavani Thuraisingham University of Texas at Dallas
Vijay Varadharajan Macquarie University
Xinwen Zhang Samsung
William Winsborough University of Texas at San Antonio
Duminda Wijesekera George Mason University
Shouhuai Xu University of Texas at San Antonio

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CODASPY 2025   The 15th ACM Conference on Data and Application Security and Privacy
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
IWSPA 2025   IWSPA 2025 : The 11th ACM International Workshop on Security and Privacy Analytics
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing