Call for Participation

Call for Participation PDF

ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.

If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.

We are soliciting submissions in a number of different categories:

Technical Track:peer-reviewed papers
Panels:proposals for interactive panels
Case Studies:practical experience reports from applying security
WIP:works in progress reports
Tutorials:in depth seminars on current security topics
Workshop:on up to date hot topics

We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:

  • Access control
  • Applied cryptography
  • Audit and audit reduction
  • Biometrics
  • Boundary control devices
  • Certification and accreditation
  • Database security
  • Defensive information warfare
  • Denial of service protection
  • Distributed systems security
  • Electronic commerce security
  • Enterprise security
  • Forensics
  • Identification and authentication
  • Identity management
  • Incident response planning
  • Information survivability
  • Insider threat protection
  • Integrity
  • Intellectual property rights protection
  • Intrusion detection
  • Malware
  • Mobile and wireless security
  • Multimedia security
  • Operating systems security
  • Peer-to-peer security
  • Privacy and data protection
  • Product evaluation criteria and compliance
  • Risk/vulnerability assessment
  • Secure location services
  • Security engineering and management
  • Security in IT outsourcing
  • Service Oriented Architectures
  • Software assurance
  • Trust management
  • Virtualization security
  • VoIP security

Important submission information:

  Submission
Deadline
Acceptance
Notification
Technical TrackJune 1, 2008June 8, 2008Aug. 18, 2008
PanelsJune 1, 2008June 16, 2008Aug. 18, 2008
TutorialsJune 1, 2008June 9, 2008*Aug. 18, 2008
WorkshopJune 1, 2008Aug. 18, 2008
Case StudiesJune 1, 2008Aug. 18, 2008
Works in ProgressSep. 13, 2008Oct. 3, 2008

* An additional tutorial submission extension to the 16th may be granted if request is submitted by the 9th.


Technical Track Paper Submissions (contact Program Chair)

  • Pierangela Samarati, University of Milan (Program Chair)
  • Charles Payne, Adventium Labs (Program Co-chair)
Papers offering novel contributions in any aspect of computer and application security are solicited. Papers may present technique, applications, or practical experience, or theory that has a clear practical impact. Papers are encouraged on technologies and methods that have been demonstrated to be useful for improving information systems security and that address lessons from actual application.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 15 pages including the bibliography and well-marked appendices (single column, using 11-point font and reasonable margins on letter-size paper). Committee members are not required to read the appendices, and so the paper should be intelligible without them. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions are to be made using the OpenConf system on this site. Only pdf or postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline above. Authors of accepted papers must guarantee that their papers will be presented at the conference.

More info


Panels (contact Panels Chair)

  • Michael Franz, UC Irvine (Panels Chair)
Panels are encouraged on the topics listed above. Panels may frame a debate on a controversial question or summarize interesting results, but they must encourage audience participation. A typical submission will include a proposed moderator, panel members (usually 3-5) and an abstract of the proposed topic.

More info


Case Studies in Applied Security (contact Case Studies Chair)

  • Steven Rome, Booz Allen Hamilton (Case Studies Chair)
The Case Studies in Applied Security Track is a critical part of the technical conference. It is an opportunity for professionals to share information that is current without writing a detailed technical paper. It is open to anyone in the community such as vendors, network providers, systems integrators, government civil/federal/military programs or users across the spectrum of computer security applications. While the Case Studies will not be included in the Proceedings, the presentations will be posted to the ACSAC site following the conference.

More info


Works In Progress (Contact WIP Chair)

  • John McDermott (WiP Chair)
The Works In Progress (WIP) session packs as many 5 minute presentations as it can into one fast paced and popular session. These talks highlight the most current work in both business and academia, emphasizing goals and value added, accomplishments to date, and future plans. Special consideration is given to topics that discuss real life security experience, including system implementation, deployment, and lessons learned.

More info


Tutorials (contact Tutorials Chair)

  • Daniel Faigin, The Aerospace Corporation, USA. (Tutorials Chair)
Tutorials are full (6 hour) or half (3 hour) day classes on how to apply or use a particular technology to address a security need. A typical tutorial submission includes an abstract of the tutorial, a brief (1-2 page) outline, an instructor bio, an indication of length, and notes on prerequisites and textbooks. Tutorial instructors receive an honorarium and expenses. If you would like to indicate a topic you would like to see, you may do that as well; please suggest an instructor if you can. Send your submissions to... [tutorials_chair].

More info


Workshop (Contact Workshops Chair)

  • Harvey Rubinovitz, The MITRE Corporation (Workshop Chair)
ACSAC workshops are on up to date topics that attendees usually rate to provide a useful and exciting forum for information technology professionals (e.g., standards developers, software developers, security engineers, security officers) to exchange ideas, concerns, and opinions.

More info


Exhibitors & Sponsors

Again this year we will offer attendees access to exhibits and displays of products and services related to the conference topics. To learn more about exhibits and sponsorship opportunities go to http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00FYJS.


Conferenceship Program

ACSAC offers a conferenceship program to enable students to attend the Annual Computer Security Applications Conference. This program will pay for the conference and tutorial expenses, including travel, for selected students. Additional information about this program is available on the Student Awards page.


Future Updates:

To be added to the Annual Computer Security Applications Conference Mailing List, click here.


ACSAC does not accept "speaking proposals" per se, however; you are encouraged to submit suggestions in the form of a one paragraph description of a topic and a biography of the proposed presenter. Depending on a proposal's technical content, it may be acceptable as a case study. If a full paper is available, it may be acceptable as a technical paper. If a presentation by a group of related speakers is contemplated, a proposal for this session may be acceptable as a panel or forum. If a proposal for a half day or full day seminar is appropriate, it may be acceptable as a tutorial. If a one or two page technical writeup is available that describes work that is not yet completed, it may be acceptable as a works in progress. Finally, if your have an interest in a full day interactive dialogue, exchanging ideas, opinions and concerns between multiple presenters and attendees, consider being a workshop presenter.

For More Information

About the Sponsor

Applied Computer Security Associates (ACSA) had its genesis in the first Aerospace Computer Security Applications Conference in 1985. That conference was a success and evolved into the Annual Computer Security Applications Conference (ACSAC). Several years ago the word "Aerospace" was dropped from the name to promote a wider range of government and commercial applications. ACSA was incorporated in 1987 as a non-profit association of computer security professionals who have a common goal of improving the understanding, theory, and practice of computer security. ACSA continues to be the primary sponsor of the annual conference.

In 1989, ACSA began the Distinguished Lecture Series at the annual conference. Each year, an outstanding computer security professional is invited to present a lecture of current topical interest to the security community. In 1991, ACSA began a Best-Paper by a Student Award, presented at the Annual conference. This award is intended to encourage active student participation in the annual conference. The award winning student author receives an honorarium and all expenses to the conference.

ACSA continues to be committed to serving the security community by finding additional approaches for encouraging and facilitating dialogue and technical interchange. ACSA is always interested in suggestions from interested professionals and computer security professional organizations on how to achieve these goals.