Difference between revisions of "CCS 2008"

From Openresearch
Jump to: navigation, search
m
Line 1: Line 1:
 
{{Event
 
{{Event
| Acronym = CCS 2008
+
|Acronym=CCS 2008
| Title = 15th ACM Conference on Computer and Communications Security 2008
+
|Title=15th ACM Conference on Computer and Communications Security 2008
| Type = Conference
+
|Series=CCS
| Series = CCS
+
|Type=Conference
| Field = Computer security and reliability
+
|Field=Computer security and reliability
| Homepage = www.acm.org/sigs/sigsac/ccs
+
|Start date=2008/10/27
| Start date = Nov 3, 2008  
+
|End date=2008/10/31
| End date = Nov 7, 2008
+
|Homepage=www.sigsac.org/ccs/CCS2008/
| City= Alexandria
+
|City=Alexandria
| State = VA
+
|State=VA
| Country = USA
+
|Country=USA
| Abstract deadline =
+
|Submission deadline=2008/04/14
| Submission deadline = Apr 14, 2008
 
| Notification =
 
| Camera ready =
 
 
}}
 
}}
 +
Quote from the conference homepage:
 +
 +
<blockquote>
 +
''The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer security, as well as case studies and implementation experiences.''
 +
</blockquote>

Revision as of 23:28, 16 October 2008

CCS 2008
15th ACM Conference on Computer and Communications Security 2008
Event in series CCS
Dates 2008/10/27 (iCal) - 2008/10/31
Homepage: www.sigsac.org/ccs/CCS2008/
Location
Location: Alexandria, VA, USA
Loading map...

Important dates
Submissions: 2008/04/14
Table of Contents


Quote from the conference homepage:

The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer security, as well as case studies and implementation experiences.