ACSAC 2016: Difference between revisions
Created page with "{{Event |Acronym=ACSAC 2016 |Title=Annual Computer Security Applications Conference 2016 |Series=Annual Computer Security Applications Conference |Type=Conference |Field=Compu..." |
Heike.Rohde (talk | contribs) No edit summary |
||
| (3 intermediate revisions by 2 users not shown) | |||
| Line 1: | Line 1: | ||
{{Event | {{Event | ||
|Acronym=ACSAC 2016 | |Acronym=ACSAC 2016 | ||
|Title=Annual Computer Security Applications Conference | |Title=32nd Annual Computer Security Applications Conference | ||
|Series= | |Ordinal=32 | ||
|Series=ACSAC | |||
|Type=Conference | |Type=Conference | ||
|Field=Computer security and reliability | |Field=Computer security and reliability | ||
|Start date= | |Start date=2016/12/05 | ||
|End date= | |End date=2016/12/09 | ||
|Submission deadline=2016/06/01 | |||
|Homepage=www.acsac.org/2016/cfp/ | |Homepage=www.acsac.org/2016/cfp/ | ||
|City=Los Angeles | |City=Los Angeles | ||
|State=California | |State=California | ||
|Country=USA | |Country=USA | ||
|Abstract deadline=2016/09/01 | |||
|Abstract deadline= | |Poster deadline=2016/09/01 | ||
|Poster deadline= | |Workshop deadline=2016/06/01 | ||
|Workshop deadline= | |||
}} | }} | ||
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. | |||
==Topics== | |||
* Access Control | |||
* Applied Cryptography | |||
* Assurance | |||
* Audit | |||
* Biometrics | |||
* Case studies | |||
* Cloud Security | |||
* Cyber-Physical Systems | |||
* Denial of Service Protection | |||
* Distributed Systems Security | |||
* Electronic Commerce | |||
* Enterprise Security Management | |||
* Evaluation and Compliance | |||
* Forensics | |||
* Identity Management | |||
* Incident Response Planning | |||
* Insider Threat protection | |||
* Integrity | |||
* Intrusion Detection | |||
* Intellectual Property | |||
* Malware | |||
* Mobile/Wireless Security | |||
* Multimedia Security | |||
* Network Security | |||
* OS Security | |||
* P2P Security | |||
* Privacy & Data Protection | |||
* Privilege Management | |||
* Resilience | |||
* Security and Privacy of the Internet of Things [https://www.acsac.org/2016/cfp/hardtopic/ Hard Topic Theme!] | |||
* Security Engineering | |||
* Software Security | |||
* Supply Chain Security | |||
* Trust Management | |||
* Trustworthy Computing | |||
* Usability and Human-centric Aspects of Security | |||
* Virtualization Security | |||
* Web Security | |||
==Submissions== | ==Submissions== | ||
==Important Dates== | ==Important Dates== | ||
Latest revision as of 13:32, 7 January 2021
| ACSAC 2016 | |
|---|---|
32nd Annual Computer Security Applications Conference
| |
| Ordinal | 32 |
| Event in series | ACSAC |
| Dates | 2016/12/05 (iCal) - 2016/12/09 |
| Homepage: | www.acsac.org/2016/cfp/ |
| Location | |
| Location: | Los Angeles, California, USA |
| Important dates | |
| Workshops: | 2016/06/01 |
| Abstracts: | 2016/09/01 |
| Posters: | 2016/09/01 |
| Submissions: | 2016/06/01 |
| Table of Contents | |
The following coordinate was not recognized: Geocoding failed.The following coordinate was not recognized: Geocoding failed.
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
Topics
- Access Control
- Applied Cryptography
- Assurance
- Audit
- Biometrics
- Case studies
- Cloud Security
- Cyber-Physical Systems
- Denial of Service Protection
- Distributed Systems Security
- Electronic Commerce
- Enterprise Security Management
- Evaluation and Compliance
- Forensics
- Identity Management
- Incident Response Planning
- Insider Threat protection
- Integrity
- Intrusion Detection
- Intellectual Property
- Malware
- Mobile/Wireless Security
- Multimedia Security
- Network Security
- OS Security
- P2P Security
- Privacy & Data Protection
- Privilege Management
- Resilience
- Security and Privacy of the Internet of Things Hard Topic Theme!
- Security Engineering
- Software Security
- Supply Chain Security
- Trust Management
- Trustworthy Computing
- Usability and Human-centric Aspects of Security
- Virtualization Security
- Web Security
Submissions
Important Dates
Committees
- Co-Organizers
- General Co-Chairs
- some person, some affiliation, country
- PC Co-Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co-Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co-Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country