Call for Submissions - Topics

We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:

  • Access control
  • Assurance
  • Audit
  • Biometrics
  • Boundary control
  • Cloud security
  • Cybersecurity
  • Denial of service protection
  • Distributed systems security
  • Electronic commerce security
  • Enterprise security management
  • Forensics
  • Identity management
  • Incident response planning
  • Insider threat protection
  • Integrity
  • Intellectual property rights protection
  • Intrusion detection and prevention
  • Malware
  • Mobile and wireless security
  • Multimedia security
  • Network resiliency
  • Operating systems security
  • Peer-to-peer security
  • Privacy and data protection
  • Privilege management
  • Product evaluation and compliance
  • Resilience
  • Security engineering
  • Security usability
  • Software security
  • Supply chain risk
  • Trust management
  • Virtualization security
  • VoIP security
  • Web 2.0/3.0 security

Additional ACSA Events:
NSPW – New Security Paradigms Workshop
LASER – Learning from Authoritative Security Experiment Results