(Apologies if you receive this announcement multiple times)<br><br>Dear all,<br><br>sorry to re-send this message but there was a mistake in the dates. <br>Really sorry for that. Good news is that if you are interested to <br>
submit you can still do that.<br><br>Abstracts should be sent today and papers by Sept 15th.<br><br>Below the up-to-date CfP also available on the web page:<br><br> <a href="http://www.dmi.unict.it/~giamp/sac/10cfp.html">http://www.dmi.unict.it/~giamp/sac/10cfp.html</a><br>
<br>Best regards,<br>Luca<br><br>===============<br>CALL FOR PAPERS<br>===============<br><br>SAC 2010<br>The 25th ACM Symposium on Applied Computing<br>22-26 March 2010, Lausanne, Switzerland<br>Track on Computer Security (9th edition)<br>
<br><br>SAC 2010<br>For the past twentytwo years the ACM Symposium on Applied Computing (SAC) has been a primary forum for applied computer scientists, computer engineers and application developers to gather, interact, and present their research. SAC is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP); its proceedings are published by ACM in both printed form and CD-ROM; they are also available on the web through the ACM Digital Library. More information about SIGAPP and past editions of SAC can be found at <a href="http://www.acm.org/sigapp">http://www.acm.org/sigapp</a><br>
<br>2010 Track on Computer Security (9th edition)<br>The Security Track reaches its ninth edition this year, thus appearing among the most established tracks in the Symposium. The list of issues remains vast, ranging from protocols to workflows .<br>
<br>Topics of interest include but are not limited to<br><br> * software security (protocols, operating systems, etc.)<br> * hardware security (smartcards, biometric technologies, etc.)<br> * mobile security (properties for/from mobile agents, etc.)<br>
* network security (anti-virus, anti-hacker, anti-DoS tools, firewalls, real-time monitoring, etc.)<br> * alternatives to cryptography (steganography, etc.)<br> * security-specific software development practices (vulnerability testing, fault-injection resilience, etc.)<br>
* privacy and anonimity (trust management, pseudonimity, identity management, etc.)<br> * safety and dependability issues (reliability, survivability, etc.)<br> * cyberlaw and cybercrime (copyrights, trademarks, defamation, intellectual property, etc.)<br>
* security management and usability issues (security configuration, policy management, usability trials etc.)<br> * workflow and service security (business processes, web services, etc.)<br><br>Best Papers<br>The best papers of the 2003 edition are published in a special issue of Concurrency and Computation: Practice and Experience (Wiley), vol. 16, no.1, 2004.<br>
The best papers of the 2004 edition are published in a special issue of the Journal of Computer Security (IOS), vol. 13, no.5, 2005. <br>The best papers of the 2006 edition are published in a special issue of the Journal of Computer Security (IOS), vol. 17, no.3, 2009. <br>
This practice will be continued on the basis of appropriateness of the submissions.<br><br><br>Track Website<br><a href="http://www.dmi.unict.it/~giamp/sac">http://www.dmi.unict.it/~giamp/sac</a>.<br> <br><br>Track Program Chairs<br>
<br> * Giampaolo BELLA<br> Dipartimento di Matematica e Informatica - Universita' di Catania<br> Viale A. Doria, 6<br> I-95125 Catania, Italy<br> email: <a href="mailto:giamp@dmi.unict.it">giamp@dmi.unict.it</a><br>
<br> * Luca COMPAGNA<br> SAP Research France<br> 805, Avenue du Dr Maurice Donat<br> F-06250 Mougins - France<br> email: <a href="mailto:luca.compagna@sap.com">luca.compagna@sap.com</a><br><br>Program Committee<br>
<br> * Gail-Joon Ahn (Department of Computer Science and Engineering, Arizona State University, USA)<br> * Arslan Broemme (InterComponentWare AG, Germany)<br> * Iliano Cervesato (Carnegie Mellon University, Qatar)<br>
* David W Chadwick (Computing Laboratory, University of Kent, UK)<br> * Bruce Christianson (Faculty of Engineering & Information Sciences, University of Hertfordshire, UK)<br> * Cas Cremers (ETH Zurich, Switzerland)<br>
* Nancy Durgin (Sandia National Laboratories, USA)<br> * Simon Foley (Department of Computer Science, University College, Cork, Ireland)<br> * Dieter Gollmann (TU Hamburg, Germany)<br> * Stefanos Gritzalis (Department of Information and Communication Systems Engineering, University of the Aegean, Greece)<br>
* Sokratis K Katsikas (Department of Technology Education & Digital Systems, University of Piraeus, Greece)<br> * Helmut Kurth (ATSEC, Germany)<br> * Chris Lesniewski-Laas (MIT, USA)<br> * Volkmar Lotz (SAP Research, France)<br>
* Fabio Martinelli (National Research Council, Italy)<br> * John McDermott (Naval Research Lab, USA)<br> * Chris Mitchell (Royal Holloway, University of London, UK)<br> * David von Oheimb (Siemens Corporate Technology, Munich, Germany)<br>
* Dusko Pavlovic (Kestrel Institute, USA, & Oxford University, UK)<br> * Alessandro Sorniotti (Institut Eurécom, France)<br> * Jianying Zhou (Institute for Infocomm Research, Singapore)<br><br><br>Submission Guidelines<br>
The submission guidelines must be strictly followed for a paper to be considered.<br><br>Original papers from the above mentioned or other related areas will be considered. Only full papers about original and unpublished research are sought. Parallel submission to other conferences or other tracks of SAC 2010 is forbidden. Each paper must be BLIND in the sense that it must only include its title but not mention anything about its authors. Self-reference must be blind too. All submissions must be formatted using the ACM conference-specific LaTeX style, which can be obtained from the symposium web page.The standard extension of a submission in the stated format is 5 pages (approximately 5000 words). Longer papers (up to 8 pages maximum) will imply an additional charge. All papers must be submitted by 8 September 2009.<br>
<br>There is a symposium-wide paper management system for SAC 2010, which authors must use to submit their papers.<br>Review and publication of accepted papers<br>Each paper will be fully refereed and undergo a blind review process by at least three referees.Accepted papers will be published in the ACM SAC 2010 proceedings. Some papers may only be accepted as poster papers, and will be published as extended 2-page abstracts in the proceedings. According to the authors' guidelines, which can be obtained from the symposium web page, at least one author per paper must register before their paper is included in the proceedings.<br>
<br><br>Important Dates<br><br> * 8 September 2009: Submission of *abstracts*<br> * 15 September 2009 (extended): Submission of full papers<br> * 19 October 2009: Notification of Acceptance/Rejection<br> * 2 November 2009: Camera-Ready copies of accepted papers<br>
* 22-26 March 2010: SAC 2010 takes place<br><br><br>