From ConfIDent

Tempe Mission Palms, Tempe, Arizona, United States of America

Loading map...

8th ACM Conference on Data and Application Security and Privacy will be held on March 19-21, 2018, in Tempe, Arizona, USA.

Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area.

The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to: Application-layer security policies Access control for applications Access control for databases Data-dissemination controls Data forensics Enforcement-layer security policies Privacy-preserving techniques Private information retrieval Search on protected/encrypted data Secure auditing Secure collaboration Secure data provenance Secure electronic commerce Secure information sharing Secure knowledge management Secure multiparty computation Secure software development Securing data/apps on untrusted platforms Securing the semantic web Security and privacy in GIS/spatial data Security and privacy in healthcare Security and privacy in the Internet of Things Security policies for databases Social computing security and privacy Social networking security and privacy Trust metrics for applications, data, and users Usable security and privacy Web application security

Instructions for Paper Authors Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.

Submissions must be at most 10 pages in double-column ACM format (as specified at excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines will be rejected without review.

Submissions should be made electronically at:

Submissions that are not accepted as full papers may be invited to appear as short papers (8 pages) or posters.

Instructions for Poster Authors The CODASPY 2018 posters track seeks to quickly disseminate novel, on-going security and privacy research at an initial stage.

Poster submissions must include a three-page poster paper and a one-page slide with the poster contents (submitted as attachment), both as PDF files. Poster papers should use the same format as full-length papers. Accepted poster papers will be included in the posters section of the conference proceedings. Submissions should be made electronically at: TBD

Instructions for Industrial Position Paper Authors The CODASPY 2018 industry position papers track seeks to introduce on-going security and privacy practices from the industry sector. Also, industry participants will have an opportunity to meet many students and researchers within the data and application security and privacy field.

Position paper submissions must include a 2-4 page paper as a PDF file. Position papers should use the same format as full-length papers. Accepted position papers will be included in the industry papers section of the conference proceedings. Submissions should be made electronically at: TBD

Important Dates Abstract submission deadline: September 5, 2017, 23:59 anywhere in the world Paper submission deadline: September 12, 2017, 23:59 anywhere in the world Poster submission: TBA Notification to (conference) authors: November 21, 2017 Camera-ready papers and posters: TBA

Program Chairs Gabriel Ghinita (University of Massachusetts, Boston) Ram Krishnan (University of Texas at San Antonio)

Program Committee Gail-Joon Ahn Arizona State University Vijay Atluri Rutgers University Elisa Bertino Purdue University Barbara Carminati University of Insubria Lorenzo Cavallaro, Royal Holloway, University of London Naranker Dulay Imperial College London Manuel Egele Boston University Elena Ferrari University of Insubria Philip Fong University of Calgary Debin Gao Singapore Management University Gabriel Ghinita University of Massachusetts at Boston Hannes Hartenstein KIT Christian Jensen Technical University of Denmark Martin Johns SAP Research Murat Kantarcioglu University of Texas at Dallas Alexandros Kapravelos North Carolina State University Guenter Karjoth Lucerne University of Applied Sciences & Arts Florian Kelbert Imperial College London Ram Krishnan University of Texas at San Antonio Yves Le Traon University of Luxembourg Adam Lee University of Pittsburg Qi Li Tsinghua University Ninghui Li Purdue University Fabio Martinelli IIT-CNR Martín Ochoa SUTD Jaehong Park University of Alabama in Huntsville Alexander Pretschner Technische Universität München Indrajit Ray Colorado State University Vassil Roussev University of New Orleans Anna Squicciarini The Pennsylvania State University Scott Stoller Stony Brook University Hassan Takabi University of North Texas Mahesh Tripunitara University of Waterloo Shambhu Upadhyaya SUNY at Buffalo Danfeng Yao Virginia Tech Roland Yap National University of Singapore Ting Yu Qatar Computing Research Institute Chuan Yue Colorado School of Mines Junyuan Zeng The University of Texas at Dallas

Cookies help us deliver our services. By using our services, you agree to our use of cookies.