The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security, as well as case studies and implementation experiences. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topic areas related to computer and communications security are of interest and in scope.

Paper Submission Process

Submissions must be made by the deadline of April 20, 2009, through the website: Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Authors should relate their submission to any other relevant submissions of theirs in other venues that are under review at the same time as their submission to CCS 2009. Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. CCS, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of a program chairs, take action against authors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to ensure the integrity of papers under consideration. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Paper Format

Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered), excluding the bibliography and well-marked appendices and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. All submissions must be anonymized (an author's name should only occur in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others). Only PDF or Postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Publication. Accepted papers will be published by ACM Press in a conference proceedings. Outstanding papers will be invited for possible publication in a special issue of the ACM Transactions on Information and System Security. Final proceedings versions will be 10 pages in double-column ACM format; although authors will have the option of buying a limited number of additional pages.

Important Dates

  • Paper Submission Due: April 20, 2009 (11:59 PM CDT)
  • Acceptance Notification: July 12, 2009
  • Camera Ready Papers Due: August 17, 2009


Steering Commitee
Organizing Commitee
Program Commitee

Last modified: 2009-01-27 10:32:35 EST