CALL FOR PARTICIPATION

ACSAC Logo
Submission Logo
Scholorship Logo
Mailing List Logo
Email Logo
ACSA Logo
About the Conference
Submission Instructions
Conferenceship
Mailing List
For More Information
About the Sponsor

-----------
 

ACSAC Logo

 

About the Conference

If you are developing practical solutions to problems relating to protecting your commercial enterprise or country's information infrastructure, consider submitting a paper to the Annual Computer Security Applications Conference, to be held this December. Papers that address the application of technology, the implementation of systems, and lessons learned will be given special consideration.

This internationally recognized conference provides a forum for experts in information system security to exchange practical ideas about solving these critical problems. We are looking for papers, panels, case studies presentations, and tutorials that address:

  • Access control
  • Applied cryptography
  • Audit and audit reduction
  • Biometrics
  • Certification and accreditation
  • Database Security
  • Denial of service protection
  • Defensive information warfare
  • Electronic commerce security
  • Enterprise Security
  • Firewalls and other boundary control devices
  • Forensics
  • Identification and Authentication
  • Information Survivability
  • Insider threat protection
  • Integrity
  • Intellectual property rights protection
  • Incident response planning
  • Intrusion detection and event correlation
  • Middleware and distributed systems security
  • Mobile Security
  • Modeling and simulation related to security
  • Operating systems security
  • Product evaluation criteria and compliance
  • Privacy
  • Risk/vulnerability assessment
  • Security engineering
  • Security management
  • Software safety and program correctness
  • Wireless Security


Submission Logo

Submission Instructions

Details of topics of interest, as well as submission procedures can be found on the individual web pages: Note: The submission deadline for refereed papers is 1 June 2003.

ACSAC does not accept "speaking proposals" in the form of a biography and a one paragraph description of a topic. Depending on a proposal's technical content, it may be acceptable as a case study. If a full paper is available, it may be acceptable as a technical paper. If a presentation by a group of related speakers is contemplated, a proposal for this session may be acceptable as a panel or forum. If a proposal for a half day or full day seminar is appropriate, it may be acceptable as a tutorial. If a one or two page technical writeup is available that describes work that is not yet completed, it may be acceptable as a works in progress. Finally, if your have an interest in a full day interactive dialogue, exchanging ideas, opnions and concerns between multiple presenters and attendees, consider being a workshop presenter.


Scholarship Logo

Conferenceship Program

ACSAC offers a conferenceship program to enable students to attend the Annual Computer Security Applications Conference. This program will pay for the conference and tutorial expenses, including travel, for selected students. Additional information about this program is available on the Student Awards page or you may contact the Student Papers Chair.



Email Logo

The Annual Computer Security Applications Conference Mailing List

To be added to the Annual Computer Security Applications Conference Mailing List, click here.



Submissions Logo

For More Information


ACSA Logo

About the Sponsor

Applied Computer Security Associates (ACSA) had its genesis in the first Aerospace Computer Security Applications Conference in 1985. That conference was a success and evolved into the Annual Computer Security Applications Conference (ACSAC). Several years ago the word "Aerospace" was dropped from the name to promote a wider range of government and commercial applications. ACSA was incorporated in 1987 as a non-profit association of computer security professionals who have a common goal of improving the understanding, theory, and practice of computer security. ACSA continues to be the primary sponsor of the annual conference.

In 1989, ACSA began the Distinguished Lecture Series at the annual conference. Each year, an outstanding computer security professional is invited to present a lecture of current topical interest to the security community. In 1991, ACSA began a Best-Paper by a Student Award, presented at the Annual conference. This award is intended to encourage active student participation in the annual conference. The award winning student author receives an honorarium and all expenses to the conference.

ACSA continues to be committed to serving the security community by finding additional approaches for encouraging and facilitating dialogue and technical interchange. ACSA is always interested in suggestions from interested professionals and computer security professional organizations on how to achieve these goals.