Difference between revisions of "ACSAC 2016"

From Openresearch
Jump to: navigation, search
(Created page with "{{Event |Acronym=ACSAC 2016 |Title=Annual Computer Security Applications Conference 2016 |Series=Annual Computer Security Applications Conference |Type=Conference |Field=Compu...")
 
(Topics)
Line 20: Line 20:
  
 
==Topics==
 
==Topics==
 +
* Access Control
 +
* Applied Cryptography
 +
* Assurance
 +
* Audit
 +
* Biometrics
 +
* Case studies
 +
* Cloud Security
 +
* Cyber-Physical Systems
 +
* Denial of Service Protection
 +
* Distributed Systems Security
 +
* Electronic Commerce
 +
* Enterprise Security Management
 +
* Evaluation and Compliance
 +
* Forensics
 +
* Identity Management
 +
* Incident Response Planning
 +
* Insider Threat protection
 +
* Integrity
 +
* Intrusion Detection
 +
* Intellectual Property
 +
* Malware
 +
* Mobile/Wireless Security
 +
* Multimedia Security
 +
* Network Security
 +
* OS Security
 +
* P2P Security
 +
* Privacy & Data Protection
 +
* Privilege Management
 +
* Resilience
 +
* Security and Privacy of the Internet of Things [https://www.acsac.org/2016/cfp/hardtopic/ Hard Topic Theme!]
 +
* Security Engineering
 +
* Software Security
 +
* Supply Chain Security
 +
* Trust Management
 +
* Trustworthy Computing
 +
* Usability and Human-centric Aspects of Security
 +
* Virtualization Security
 +
* Web Security
 +
 
==Submissions==
 
==Submissions==
 
==Important Dates==
 
==Important Dates==

Revision as of 13:19, 23 April 2016

ACSAC 2016
Annual Computer Security Applications Conference 2016
Event in series Annual Computer Security Applications Conference
Dates Dec 5, 2016 (iCal) - Dec 9, 2016
Homepage: www.acsac.org/2016/cfp/
Location
Location: Los Angeles, California, USA
Loading map...

Important dates
Workshops: June 1, 2016
Abstracts: September 1, 2016
Posters: September 1, 2016
Submissions: Jun 1, 2016
Table of Contents


Enter your description here. Maybe just paste in the call for papers.

Topics

  • Access Control
  • Applied Cryptography
  • Assurance
  • Audit
  • Biometrics
  • Case studies
  • Cloud Security
  • Cyber-Physical Systems
  • Denial of Service Protection
  • Distributed Systems Security
  • Electronic Commerce
  • Enterprise Security Management
  • Evaluation and Compliance
  • Forensics
  • Identity Management
  • Incident Response Planning
  • Insider Threat protection
  • Integrity
  • Intrusion Detection
  • Intellectual Property
  • Malware
  • Mobile/Wireless Security
  • Multimedia Security
  • Network Security
  • OS Security
  • P2P Security
  • Privacy & Data Protection
  • Privilege Management
  • Resilience
  • Security and Privacy of the Internet of Things Hard Topic Theme!
  • Security Engineering
  • Software Security
  • Supply Chain Security
  • Trust Management
  • Trustworthy Computing
  • Usability and Human-centric Aspects of Security
  • Virtualization Security
  • Web Security

Submissions

Important Dates

Committees

  • Co-Organizers
  • General Co-Chairs
  • Local Organizing Co-Chairs
  • Program Committee Members