![]() |
![]() |
![]() ![]() |
The conference seeks submissions from academia and industry presenting novel
research on all theoretical and practical aspects of computer security, as well
as case studies and implementation experiences. Papers should have practical
relevance to the construction, evaluation, application, or operation of secure
systems. Theoretical papers must make convincing argument for the practical
significance of the results.
Submitted papers must not substantially overlap papers that
have been published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 10 pages in
double-column ACM format, excluding the bibliography and well-marked appendices,
and at most 12 pages overall. Please include page numbers on all submissions to
make it easier for reviewers to provide helpful comments. Committee members are
not required to read appendices, so the paper should be intelligible without
them. Final proceedings versions will be 10 pages in double-column ACM format;
although authors will have the option of buying a limited number of additional
pages. All submissions should be anonymized (an author’s name should only
occur in references to that author’s related work, which should be referenced in
the third person and not overtly distinguishable from the referenced work of
others). Submission website has been closed.
Only pdf or postscript files will be accepted.. Submissions not meeting these
guidelines risk rejection without consideration of their merits. Papers must be
received by the deadline of May 8, 2007 23:59 Samoa Time (UTC-11). Authors of accepted papers must
guarantee that their papers will be presented at the conference. Accepted papers
will be published by the ACM in a conference proceedings. Outstanding papers
will be invited for possible publication in a special issue of the ACM
Transactions on Information and System Security.
Fraudulent submission policy. Simultaneous submission of the
same work to multiple venues, submission of previously published work,
and plagiarism constitute dishonesty or fraud. CCS, like other
scientific and technical conferences and journals, prohibits these
practices and may, on the recommendation of a program chair, take
action against authors who have committed them. In some cases,
program committees may share information about submitted papers with
other conference chairs and journal editors to ensure the integrity of
papers under consideration. Violation of these principles is a serious
matter and will be treated as such.
Proposals for 90-minute tutorials on
research topics of current and emerging interest should be submitted
electronically by May 8, 2007. To submit, please send a brief proposal to the Tutorials Chair, Wenliang (Kevin) Du, at ccs07_tutorials@ecs.syr.edu .Tutorial proposals must clearly identify
the intended audience and any prerequisite knowledge for attendees. Proposals
must be no more than one page, and must include enough material to provide a
sense of the scope and depth of coverage, as well as a brief biography of the
speaker(s). Tutorial presenters will receive a modest honorarium.
Topics of interest include:
anonymity
access control
secure networking
accounting and audit
trust models
key management
intrusion detection
authentication
smartcards
security location services
data and application security
privacy-enhancing technology
inference/controlled disclosure
intellectual property protection
digital rights management
trust management policies
electronic fraud relating to
phishing
commercial and industry security
security management
database security
applied cryptography
peer-to-peer security
security for mobile code
cryptographic protocols
data/system integrity
information warfare
identity management
security in IT outsourcing
Paper Submissions:
Important dates:
Paper Submissions due: May 8, 2007 23:59 Samoa Time (UTC-11)
Acceptance notification:
July 23, 2007
Camera-ready papers due:
August 17, 2007 (9 AM EST)
Tutorial Submissions:
Paul Syverson, Naval Research Laboratory, USA
Industry and Government Track Chair: Patrick McDaniel, Penn State
University, USA
General Chair: Peng Ning, NC State University, USA
Publicity Chairs: Radha Poovendran, University of Washington, USA
Publication Chair: David Evans, University of Virginia, USA
Tutorials Chair: Wenliang (Kevin) Du, Syracuse University, USA
Treasurer: Sencun Zhu, Penn State University, USA
Workshops Chair: Vijay Atluri, Rutgers University, USA
Sushil Jajodia (Chairman), George Mason University, USA | Carl A. Gunter, University of Illinois, USA |
Pierangela Samarati, University of Milan, Italy | Ravi Sandhu, George Mason University, USA |
Martín Abadi, UC Santa Cruz & Microsoft
Research, USA Matt Edman, Rensselaer Polytechnic Institute, USA Alberto Escudero-Pascual, IT46, Sweden |
Nick Mathewson, The Free Haven Project, USA
Gerome Miklau, University of Massachusetts, USA |