CODASPY 2011 - First ACM Conference on Data and Application Security and Privacy ACM CODASPY 2011
View: 2889
Website www.codaspy.org |
Edit Freely
Category CODASPY 2011
Deadline: September 15, 2010 | Date: February 21, 2011-February 23, 2011
Venue/Country: San Antonio, U.S.A
Updated: 2010-08-16 20:57:23 (GMT+9)
Call For Papers - CFP
First ACM Conference on Data and Application Security and PrivacyACM CODASPY 2011Data and the applications that manipulate data are the crucial assets in today's information age. With the increasing drive towards availability of data and services anytime anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and/or the mobile devices they carry with them and computing new information of value to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations and government agencies to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries and the dramatic failure of old-style approaches to information protection in government agencies in keeping information too secret to connect the dots. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain.Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the conference is to discuss novel exciting research topics in data and application security and privacy and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics include (but not limited to):Application layer security policies Secure information sharingAuthorization /Access Control for Applications Secure knowledge managementAuthorization/Access Control for Databases Secure multiparty computationsData dissemination controls Secure software developmentData forensics Securing data/apps on untrusted platformsEnforcement layer security policies Securing the semantic webPrivacy preserving techniques Security and Privacy in GIS/Spatial DataPrivate information retrieval Security and Privacy in HealthcareSearch on protected/encrypted data Security policies for databasesSecure auditing Social computing security and privacySecure collaboration Social networking security and privacySecure data provenance Trust metrics for application, data and userSecure electronic commerce Web application securityImportant DatesPaper Submissions: Sept 15, 2010Notification: Nov 20, 2010Camera Ready: Dec 10, 2010
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.