Difference between revisions of "ACSAC 2016"
Jump to navigation
Jump to search
(Created page with "{{Event |Acronym=ACSAC 2016 |Title=Annual Computer Security Applications Conference 2016 |Series=Annual Computer Security Applications Conference |Type=Conference |Field=Compu...") |
Tim Holzheim (talk | contribs) (Added page provenance(#264) and contribution type(#271)) |
||
| (8 intermediate revisions by 4 users not shown) | |||
| Line 1: | Line 1: | ||
{{Event | {{Event | ||
| + | |Field=Computer security and reliability | ||
| + | |Submission deadline=2016/06/01 | ||
| + | |Abstract deadline=2016/09/01 | ||
| + | |Poster deadline=2016/09/01 | ||
| + | |Workshop deadline=2016/06/01 | ||
| + | |Start date=None | ||
|Acronym=ACSAC 2016 | |Acronym=ACSAC 2016 | ||
| − | | | + | |End date=2018-12-06 |
| − | |Series= | + | |Series=ACSAC |
| − | |Type=Conference | + | |Type =Conference |
| − | | | + | |Country=US |
| − | | | + | |State=US/CA |
| − | | | + | |City =US/CA/Los Angeles |
| − | |Homepage=www.acsac.org/2016/cfp/ | + | |Year =2016 |
| − | | | + | |Homepage=https://www.acsac.org/2016/cfp/ |
| − | | | + | |Ordinal=32 |
| − | | | + | |Title=32nd Annual Computer Security Applications Conference |
| − | | | + | |presence=presence |
| − | | | + | |pageCreator=Liy1 |
| − | | | + | |pageEditor=Heike.Rohde |
| − | + | |contributionType=1 | |
}} | }} | ||
| + | ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. | ||
| − | + | ==Topics== | |
| + | * Access Control | ||
| + | * Applied Cryptography | ||
| + | * Assurance | ||
| + | * Audit | ||
| + | * Biometrics | ||
| + | * Case studies | ||
| + | * Cloud Security | ||
| + | * Cyber-Physical Systems | ||
| + | * Denial of Service Protection | ||
| + | * Distributed Systems Security | ||
| + | * Electronic Commerce | ||
| + | * Enterprise Security Management | ||
| + | * Evaluation and Compliance | ||
| + | * Forensics | ||
| + | * Identity Management | ||
| + | * Incident Response Planning | ||
| + | * Insider Threat protection | ||
| + | * Integrity | ||
| + | * Intrusion Detection | ||
| + | * Intellectual Property | ||
| + | * Malware | ||
| + | * Mobile/Wireless Security | ||
| + | * Multimedia Security | ||
| + | * Network Security | ||
| + | * OS Security | ||
| + | * P2P Security | ||
| + | * Privacy & Data Protection | ||
| + | * Privilege Management | ||
| + | * Resilience | ||
| + | * Security and Privacy of the Internet of Things [https://www.acsac.org/2016/cfp/hardtopic/ Hard Topic Theme!] | ||
| + | * Security Engineering | ||
| + | * Software Security | ||
| + | * Supply Chain Security | ||
| + | * Trust Management | ||
| + | * Trustworthy Computing | ||
| + | * Usability and Human-centric Aspects of Security | ||
| + | * Virtualization Security | ||
| + | * Web Security | ||
| − | |||
==Submissions== | ==Submissions== | ||
==Important Dates== | ==Important Dates== | ||
Latest revision as of 19:31, 1 April 2022
| ACSAC 2016 | |
|---|---|
32nd Annual Computer Security Applications Conference
| |
| Ordinal | 32 |
| Event in series | ACSAC |
| Dates | None"None" contains an extrinsic dash or other characters that are invalid for a date interpretation. (iCal) - 2018-12-06 |
| Presence | presence |
| Homepage: | https://www.acsac.org/2016/cfp/ |
| Location | |
| Location: | US/CA/Los Angeles, US/CA, US |
| Important dates | |
| Workshops: | 2016/06/01 |
| Abstracts: | 2016/09/01 |
| Posters: | 2016/09/01 |
| Submissions: | 2016/06/01 |
| Table of Contents | |
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
Topics
- Access Control
- Applied Cryptography
- Assurance
- Audit
- Biometrics
- Case studies
- Cloud Security
- Cyber-Physical Systems
- Denial of Service Protection
- Distributed Systems Security
- Electronic Commerce
- Enterprise Security Management
- Evaluation and Compliance
- Forensics
- Identity Management
- Incident Response Planning
- Insider Threat protection
- Integrity
- Intrusion Detection
- Intellectual Property
- Malware
- Mobile/Wireless Security
- Multimedia Security
- Network Security
- OS Security
- P2P Security
- Privacy & Data Protection
- Privilege Management
- Resilience
- Security and Privacy of the Internet of Things Hard Topic Theme!
- Security Engineering
- Software Security
- Supply Chain Security
- Trust Management
- Trustworthy Computing
- Usability and Human-centric Aspects of Security
- Virtualization Security
- Web Security
Submissions
Important Dates
Committees
- Co-Organizers
- General Co-Chairs
- some person, some affiliation, country
- PC Co-Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co-Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co-Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country