CCS 2010 - CALL FOR PARTICIPATION CCS 2010 17th ACM Conference on Computer & Communications Security
Topics/Call fo Papers
CALL FOR PARTICIPATION
CCS 2010 17th ACM Conference on Computer & Communications Security
Chicago, Illinois, USA
4 - 8 October 2010
EARLY REGISTRATION is September 10
http://www.regonline.com/register/checkin.aspx?Eve...
OPENING KEYNOTE
Dr. Jon Millen, ITRE Corporation, "Adventures in Symbolic Protocol
Analysis "
TECHNICAL PROGRAM HIGHLIGHTS
Featuring technical papers, on Applied Cryptography, Attacks, RFID,
Privacy, Anonymization, Formal Techniques, Cloud Security, Security of
Mobile Services, Security for Embedded and Mobile Devices, Systems and
Networks Security, Software Security, Designing Secure Systems, Malware
and Bots topics.
The program also includes 15 technical session, 5 tutorials, 9 workshops,
and poster/demo session.
TUTORIALS
. Tutorial 1: Role Engineering--
Ian Molloy (IBM T.J. Watson Research), Mario Frank (Swiss Federal
Institute of Technology (ETH)
. Tutorial 2: Security Risk Analysis of Computer Networks: Techniques
and Challenge --
Anoop Singhal (NIST) and Xinming Ou (Kansas State University)
. Tutorial 3: Cloud Computing Security --
Dongwan Shin (New Mexico Tech), Bill Claycomb, Vincent Urias (Sandia
National Lab)
. Tutorial 4: Formal Methods For Safe Configuration of
Cyberinfrastructure --
Sanjai Narain (Telcordia Technologies) and Ehab Al Shaer (UNC Charlotte)
. Tutorial 5: "Web Application Security",
Robert Zakon (Zakon Group LLC)
MONDAY WORKSHOPS
. Workshop on Assurable and Usable Security Configuration
. Workshop on Digital Rights Management
. Workshop on Privacy in the Electronic Society
. Workshop on Scalable Trusted Computing
FRIDAY WORKSHOPS
. Workshop on Cloud Computing Security
. Workshop on Digital Identity Management
. Workshop on Insider Threats
. Workshop on Security and Privacy in Medical and Home-Care Systems
. Workshop on Security and Artificial Intelligence
note: one workshop registration is enough to attend all workshops in the
same day.
More information can be found at http://www.sigsac.org/ccs/CCS2010/
CCS 2010 17th ACM Conference on Computer & Communications Security
Chicago, Illinois, USA
4 - 8 October 2010
EARLY REGISTRATION is September 10
http://www.regonline.com/register/checkin.aspx?Eve...
OPENING KEYNOTE
Dr. Jon Millen, ITRE Corporation, "Adventures in Symbolic Protocol
Analysis "
TECHNICAL PROGRAM HIGHLIGHTS
Featuring technical papers, on Applied Cryptography, Attacks, RFID,
Privacy, Anonymization, Formal Techniques, Cloud Security, Security of
Mobile Services, Security for Embedded and Mobile Devices, Systems and
Networks Security, Software Security, Designing Secure Systems, Malware
and Bots topics.
The program also includes 15 technical session, 5 tutorials, 9 workshops,
and poster/demo session.
TUTORIALS
. Tutorial 1: Role Engineering--
Ian Molloy (IBM T.J. Watson Research), Mario Frank (Swiss Federal
Institute of Technology (ETH)
. Tutorial 2: Security Risk Analysis of Computer Networks: Techniques
and Challenge --
Anoop Singhal (NIST) and Xinming Ou (Kansas State University)
. Tutorial 3: Cloud Computing Security --
Dongwan Shin (New Mexico Tech), Bill Claycomb, Vincent Urias (Sandia
National Lab)
. Tutorial 4: Formal Methods For Safe Configuration of
Cyberinfrastructure --
Sanjai Narain (Telcordia Technologies) and Ehab Al Shaer (UNC Charlotte)
. Tutorial 5: "Web Application Security",
Robert Zakon (Zakon Group LLC)
MONDAY WORKSHOPS
. Workshop on Assurable and Usable Security Configuration
. Workshop on Digital Rights Management
. Workshop on Privacy in the Electronic Society
. Workshop on Scalable Trusted Computing
FRIDAY WORKSHOPS
. Workshop on Cloud Computing Security
. Workshop on Digital Identity Management
. Workshop on Insider Threats
. Workshop on Security and Privacy in Medical and Home-Care Systems
. Workshop on Security and Artificial Intelligence
note: one workshop registration is enough to attend all workshops in the
same day.
More information can be found at http://www.sigsac.org/ccs/CCS2010/
Other CFPs
- 2011 IEEE GCC Conference and Exhibition
- 15th World Conference on Tobacco or Health (WCTOH)
- The 5th International Conference on Management and Service Science
- Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI'11)
- 20th European Conference on Artificial Intelligence (ECAI 2012)
Last modified: 2010-09-03 08:20:14