| |||||||||||||||||
CODASPY 2014 : 4th ACM Conference on Data and Application Security and PrivacyConference Series : Conference on Data and Application Security and Privacy | |||||||||||||||||
Link: http://www.codaspy.org/ | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
4th ACM Conference on Data and Application Security and Privacy
March 3-5, 2014 San Antonio, Texas, USA www.codaspy.org Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to: - Application-layer security policies - Access control for applications - Access control for databases - Data-dissemination controls - Data forensics - Enforcement-layer security policies - Privacy-preserving techniques - Private information retrieval - Search on protected/encrypted data - Secure auditing - Secure collaboration - Secure data provenance - Secure electronic commerce - Secure information sharing - Secure knowledge management - Secure multiparty computations - Secure software development - Securing data/apps on untrusted platforms - Securing the semantic web - Security and privacy in GIS/spatial data - Security and privacy in healthcare - Security policies for databases - Social computing security and privacy - Social networking security and privacy - Trust metrics for applications, data, and users - Usable security and privacy - Web application security INSTRUCTIONS FOR PAPER AUTHORS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Submissions must be at most 10 pages in double-column ACM format (as specified at http://www.acm.org/sigs/publications/proceedings-templates/) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Submissions should be made electronically at:https://www.easychair.org/conferences/?conf=codaspy2014 INSTRUCTIONS FOR POSTER AUTHORS The CODASPY 2014 posters track seeks to quickly disseminate novel, on-going security and privacy research at an initial stage. Poster submissions must include a three-page poster paper and a one-page slide with the poster contents (submitted as attachment) , both as PDF files. Poster papers should use the same format as full-length papers. Accepted poster papers will be included in the posters section of the conference proceedings. Submissions should be made electronically at:https://www.easychair.org/conferences/?conf=codaspy2014posterstr IMPORTANT DATES Paper registration: Sep. 8 (Sunday) 2013 (11:59PM EST) Paper submission: Sep. 15 (Sunday) 2013 (11:59PM EST) Poster submission: Sep. 29 (Sunday) 2013 (11:59PM EST) Notification to authors: Nov. 25 (Monday) 2013 Camera-ready papers and posters: Dec. 20 (Friday) 2013 ORGANIZATION General Chairs: Elisa Bertino Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University Ravi Sandhu Institute for Cyber Security (ICS), University of Texas at San Antonio Technical Program Committee: Gail-Joon Ahn, Arizona State University William Enck, North Carolina State University Elena Ferrari, University of Insubria Philip W. L. Fong, University of Calgary Debin Gao, Singapore Management University Gabriel Ghinita, University of Massachusetts, Boston Carl A. Gunter, University of Illinois Hannes Hartenstein, KIT Murat Kantarcioglu, University of Texas at Dallas Guenter Karjoth, IBM Ram Krishnan, University of Texas at San Antonio Ashish Kundu, IBM T J Watson Research Center Adam J. Lee, University of Pittsburgh Qi Li, ETH Fabio Martinelli, IIT-CNR Jun Pang, University of Luxembourg Jaehong Park, University of Texas at San Antonio (chair) Günther Pernul, Universitt Regensburg Alexander Pretschner, Technische Universität München Indrajit Ray, Colorado State University Ahmad-Reza Sadeghi, TU Darmstadt Seung-Hyun Seo, Purdue U./Korea Internet & Security Agency Anna Squicciarini, The Pennsylvania State University Mahesh Tripunitara, The University of Waterloo Jaideep Vaidya, Rutgers University Vijay Varadharajan, Macquarie University Danfeng Yao, Virginia Tech Chuan Yue, University of Colorado Colorado Springs Xinwen Zhang, Huawei Research Center Posters Committee: Gabriel Ghinita, University of Massachusetts Boston, USA (chair) Ali Inan, Işık University, Turkey Michael S. Kirkpatrick, James Madison University, USA Ram Krishnan, University of Texas at San Antonio, USA Hua Lu, Aalborg University, Denmark Ian Molloy, IBM Research, USA Li Xiong, Emory University, USA Roland Yap, National University of Singapore, Singapore |
|