ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CCS 2010 - CALL FOR PARTICIPATION CCS 2010 17th ACM Conference on Computer & Communications Security

Date2010-10-04

Deadline2010-09-10

VenueChicago, USA - United States USA - United States

Keywords

Website

Topics/Call fo Papers

CALL FOR PARTICIPATION

CCS 2010 17th ACM Conference on Computer & Communications Security

Chicago, Illinois, USA

4 - 8 October 2010

EARLY REGISTRATION is September 10
http://www.regonline.com/register/checkin.aspx?Eve...

OPENING KEYNOTE

Dr. Jon Millen, ITRE Corporation, "Adventures in Symbolic Protocol
Analysis "

TECHNICAL PROGRAM HIGHLIGHTS

Featuring technical papers, on Applied Cryptography, Attacks, RFID,
Privacy, Anonymization, Formal Techniques, Cloud Security, Security of
Mobile Services, Security for Embedded and Mobile Devices, Systems and
Networks Security, Software Security, Designing Secure Systems, Malware
and Bots topics.

The program also includes 15 technical session, 5 tutorials, 9 workshops,
and poster/demo session.

TUTORIALS

. Tutorial 1: Role Engineering--
Ian Molloy (IBM T.J. Watson Research), Mario Frank (Swiss Federal
Institute of Technology (ETH)

. Tutorial 2: Security Risk Analysis of Computer Networks: Techniques
and Challenge --
Anoop Singhal (NIST) and Xinming Ou (Kansas State University)

. Tutorial 3: Cloud Computing Security --
Dongwan Shin (New Mexico Tech), Bill Claycomb, Vincent Urias (Sandia
National Lab)

. Tutorial 4: Formal Methods For Safe Configuration of
Cyberinfrastructure --
Sanjai Narain (Telcordia Technologies) and Ehab Al Shaer (UNC Charlotte)

. Tutorial 5: "Web Application Security",
Robert Zakon (Zakon Group LLC)

MONDAY WORKSHOPS

. Workshop on Assurable and Usable Security Configuration
. Workshop on Digital Rights Management
. Workshop on Privacy in the Electronic Society
. Workshop on Scalable Trusted Computing

FRIDAY WORKSHOPS

. Workshop on Cloud Computing Security
. Workshop on Digital Identity Management
. Workshop on Insider Threats
. Workshop on Security and Privacy in Medical and Home-Care Systems
. Workshop on Security and Artificial Intelligence

note: one workshop registration is enough to attend all workshops in the
same day.

More information can be found at http://www.sigsac.org/ccs/CCS2010/

Last modified: 2010-09-03 08:20:14