[ACSAC Works In Progress call]

FYI,

-jose

Forwarded message 1

  • From: Mary_Ellen_Zurko@notesdev.ibm.com <Mary_Ellen_Zurko@notesdev.ibm.com>
  • Date: Mon, 11 Jul 2005 11:48:09 -0400
  • Subject: ACSAC Works In Progress call
  • To: undisclosed-recipients:;
  • Message-ID: <OFC8704B7F.D43A448E-ON8525703B.0055C542-8525703B.0056B6FD@notesdev.ibm.com>
Friends and colleagues, please share this with anyone who might be 
interested in participating/submitting. 
        Mez


21st Annual Computer Security Applications Conference
December 5-9, 2005
Tucson, Arizona 
Works in Progress Submission Information and Form 

Thank you for your interest in submitting a Works in Progress to ACSAC, 
the Annual Computer Security Applications Conference.
The Works In Progress (WIP) session packs as many 5 minute presentations 
as it can into one fast paced and popular session. These talks highlight 
the most current work in both business and academia, emphasizing goals and 
value add, accomplishments to date, and future plans. Special 
consideration is given to topics that discuss real life security 
experience, including system implementation, deployment, and lessons 
learned.

When are WiP abstracts due?
The deadline for submitting Works in Progress abstracts is September 9. 
What should I propose a WiP on?
If you are developing practical solutions to problems relating to 
protecting your country's information infrastructure or a commercial 
enterprise, consider submitting an abstract to the Annual Computer 
Security Applications Conference. This internationally recognized 
conference provides a forum for experts in information system security to 
exchange innovative ideas about solving these critical problems. 
We are looking for Works in Progress that address just about any security 
topic, including:
Access control 
Applied cryptography 
Audit and audit reduction 
Biometrics 
Certification and accreditation 
Database Security 
Denial of service protection 
Defensive information warfare 
Electronic commerce security 
Enterprise Security 
Firewalls and other boundary control devices 
Forensics 
Identification and Authentication 
Information Survivability 
Insider threat protection 
Integrity 
Intellectual property rights protection 
Incident response planning 
Intrusion detection and event correlation 
Middleware and distributed systems security 
Mobile Security 
Modeling and simulation related to security 
Operating systems security 
Privacy 
Product evaluation criteria and compliance 
Risk/vulnerability assessment 
Security engineering 
Security management 
Security services 
Security standards and their application 
Software safety and program correctness 
User centered security 
Wireless Security 
Special consideration will be given to Works in Progress abstracts that 
discuss system implementation, deployment, and lessons learned. 
How do I submit an abstract?
Abstracts should be 1-2 type-written pages in length and should briefly 
describe the objectives of the current work, any accomplishments to date, 
and future plans. Abstracts should be sent as pdf files to 
wip_chair@acsac.org. Acceptance notifications will be sent out at the 
beginning of October. 
How do I get more information?
For additional information regarding Works in Progress, please contact the 
WIP Chair at wip_chair@acsac.org. 

Received on Monday, 11 July 2005 17:36:19 UTC