AOH :: IS1739.HTM

ACSAC 25 Call for Participation




ACSAC 25 Call for Participation
ACSAC 25 Call for Participation



  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--1780890755-2101895475-1235122650=:16639
Content-Type: TEXT/PLAIN; CHARSET=UTF-8; FORMAT=flowed
Content-Transfer-Encoding: QUOTED-PRINTABLE
Content-ID:  

Forwarded from: distribution (at) acsac.org

25th Annual Computer Security Applications Conference
ACSAC 25
7-11 December 2009
Sheraton Waikiki, Honolulu, Oahu, Hawaii, USA
http://www.acsac.org 

Call for Participation

The 25th Annual Computer Security Applications Conference (ACSAC) will 
be held the week of December 7?11, 2009, in Honolulu, Hawaii, USA. ACSAC 
is an internationally recognized forum where practitioners, researchers, 
and developers in information system security meet to learn and to 
exchange practical ideas and experiences. If you are developing, 
researching, or implementing practical solutions for protecting 
corporate or government information infrastructures, consider sharing 
your experience and expertise at this conference.

We are looking for papers, panels, tutorials, posters, case studies, and 
workshops that address such technologies, concerns, and issues as:

* Access control and biometrics
* Applied cryptography
* Audit, audit reduction and forensics
* Certification and accreditation
* Database security
* Defensive information warfare
* Denial of service protection
* Distributed systems security
* Electronic commerce security
* Enterprise security
* Identification and authentication
* Identity and trust management
* Information survivability
* Insider threat protection
* Intellectual property rights protection
* Intrusion detection
* Malware
* Mobile and wireless security
* Multimedia, P2P, and VoIP security
* Operating systems security
* Privacy and data protection
* Product evaluation=C2=A0 criteria/compliance
* Risk/vulnerability assessment
* Secure location services
* Securing cloud infrastructures
* Security engineering and management
* Security in IT outsourcing
* Software assurance
* Virtualization security
* Web 2.0 security

Important Dates
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Due Date=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0Notification
Papers=C2=A0=C2=A0=C2=A0=C2=A0        =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A01 June 2009=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A017 August 2009
Case Studies=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A01 June 2009=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A017 August 2009
Panels=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A01 June 2009=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A017 August 2009
Tutorials=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A01 June 2009=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A020 July 2009
Workshops=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A01 June 2009=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A020 July 2009
Posters=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0        =C2=A018 Sept 2009=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A016 October 2009

Come celebrate our 25th anniversary in Honolulu!

Organizers=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0
General Chair: Carrie Gates, CA Labs
Program Chair: Charles Payne, Adventium Labs
Program Co-Chair: Michael Franz, UC Irvine

ACSAC offers conferenceships for students who otherwise would not be 
able to attend the conference. The conferenceship covers hotel, 
registration and a cash award to help defray the costs with 
transportation and food. Students should contact the ACSAC student award 
chair if interested in a conferenceship.

ACSAC is sponsored by Applied Computer Security Associates (ACSA), a 
group of professionals who are working to facilitate information sharing 
among colleagues. We?re an all-volunteer not-for-profit organization.=C2=A0 
Our postal address is 2906 Covington Road, Silver Spring, MD=C2=A020910-1206. =C2=A0=C2=A0


--1780890755-2101895475-1235122650=:16639
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________      
Best Selling Security Books and More!
http://www.shopinfosecnews.org/ 

--1780890755-2101895475-1235122650=:16639--

Site design & layout copyright © 1986-2014 CodeGods