ACM Symposium on Information, Computer and Communications Security
About: ACM Symposium on Information, Computer and Communications Security is an academic conference. The conference publishes majorly in the area(s): Information security & Communications security. Over the lifetime, 9 publication(s) have been published by the conference receiving 16 citation(s).
Topics: Information security, Communications security, Cloud computing, Information technology, Digital watermarking
08 May 2013
Abstract: It is our great pleasure to welcome you to the 8th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2013, which will be held in Hangzhou, China, May 7-10, 2013. The inaugural ASIACCS was held in Taipei (2006). Since then ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), and Seoul (2012). ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We welcome subm issions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. The conference received 216 paper submissions, and accepted 35 regular papers and 27 short papers for presentation at the conference. The final versions of the accepted papers, which the authors finalized on the basis of comments from the reviewers, were included in the proceedings. Each accepted paper was carefully reviewed by at least three program committee members on the basis of its significance, novelty, and technical quality. The reviewing process was double-blind. It was followed by a Web-based discussion. Based on the comments and scores given by reviewers, the final decisions on acceptance were made.
10 Mar 2009
TL;DR: These proceedings contain the papers selected for presentation at the 4th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2009, held in Sydney, Australia, on 10-12 March 2009.
Abstract: These proceedings contain the papers selected for presentation at the 4th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2009, held in Sydney, Australia, on 10-12 March 2009. The conference is sponsored by the ACM Special Interest Group on Security, Audit, and Control (SIGSAC). ASIACCS 2009 is supported by Information and Networked Systems Security Research (INSS) at Macquarie University and Centre of Computer and Information Security at Wollongong University. This conference is also sponsored by the Australian Research Council Research Networks on Enterprise Information Infrastructures (EII) and Singapore Management University. We are grateful for their support. The ASIACCS series is built on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC) and aims at bringing together researchers and practitioners working in the areas of information, computer and communications security from universities, industry and government sectors. The conference received 147 paper submissions. Each paper was carefully reviewed by at least three members of the program committee on the basis of its significance, novelty, and technical quality. The reviewing process was double-blind and papers were selected by the program committee following online discussion on the reviewers' reports. Of the papers submitted, 33 regular papers and 7 short papers were selected for presentation at the conference. The accepted papers are from around the world including USA, Canada, China, Belgium, France, India, UK, Japan, Australia, Finland, Singapore, Sweden, Germany, Korea and Italy.
08 May 2013
TL;DR: This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing, and has received 25 submissions from fourteen countries covering four continents.
Abstract: It is our great pleasure to welcome you to the 2014 International Workshop on Security in Cloud Computing (SCC). Cloud computing has emerged as today's most exciting computing paradigm shift in information technology, since it promises numerous benefits, including lower costs, rapid scaling, easier maintenance, and ubiquitous availability. Meanwhile, cloud computing also raises many security and privacy challenges such as data protection, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. This is the second year for our SCC workshop. We received 21 submissions from nine countries covering four continents, including Canada, China, Egypt, France, India, Oman, Sudan, Sweden, and United States. The submissions were reviewed by a technical program committee of 48 experts. The final program contains 9 papers, representing an acceptance rate of 43%. Our program also features a keynote speech "On the Security of Cloud Data Storage and Sharing" by Dr. Jianying Zhou from Infocomm Security Department at Institute for Infocomm Research, Singapore.
14 Apr 2015
Abstract: It is our great pleasure to welcome you to CPSS 2015, the first Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2015. Cyber-Physical Systems (CPS) consists of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There are a multitude of CPS devices and applications being deployed to serve critical functions in our lives. The security of CPS becomes extremely important. We believe this is the right time to initiate a new workshop to provide a platform for professionals from academia, government, and industry to discuss how to address the increasing security challenges facing CPS. CPSS 2015 is organized by the Institute for Infocomm Research (I2R) and the Advanced Digital Sciences Center (ADSC), supported by National Research Foundation (NRF) and Energy Market Authority (EMA) of Singapore. The workshop is held in Singapore on 14 April 2015. The call for papers attracted 26 submissions from 16 countries: Australia, Austria, China, France, Germany, India, Iran, Italy, Japan, Netherland, Russia, Saudi Arabia, Singapore, Switzerland, UK and USA. These papers were evaluated on the basis of their significance, novelty, technical quality and practical impact. The review process was double-blinded. The program committee members have put in a significant effort in paper evaluation, and most of the papers received 4 reviews. Finally we accepted 9 papers for presentation at the workshop, with an acceptance rate of 35%. As announced in the CFP, there will be a best paper award, to encourage more high quality submissions to CPSS. The winner will be revealed at the closing session of the workshop. Besides the 9 technical presentations, there are also 3 keynote speeches. These valuable and insightful talks will guide us to a better understanding of CPS security challenges and opportunities. "Cyber-Physical Systems Security -- Experimental Analysis of a Vinyl Acetate Monomer Plan" by Dieter Gollmann (Hamburg University of Technology, Germany) "Resilience of Medical Devices and System" by Ravishankar Iyer (University of Illinois at Urbana Champaign, USA) "Cyber Security in SCADA Networks" by Ganesh Narayanan (Thales, Singapore)
03 Jun 2014
TL;DR: This year's workshop attempts to set up a tradition of being among the fora for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory.
Abstract: It is our great pleasure to welcome you to the Second International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS'2014). This year workshop continues the objectives of the first edition of the workshop aiming at discussing and building emerging security and digital forensic engineering, as disciplined sciences in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents, in order to generate conclusive descriptions and propose decisions or proofs. This year's workshop attempts to set up a tradition of being among the fora for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The mission of the workshop is to propose a platform for sharing novel security control solutions and investigation methods that fulfill the needs of networked applications and environments. It also aims at identifying new directions for future research and development in communication security and forensic science, and giving security researchers and practitioners the opportunity to share their perspectives with scientists and engineers interested in the various aspects of security. The call for papers attracted multiple submissions from Asia, Europe, Africa, and North America. The program committee accepted only 6 papers that cover a variety of topics, including: security of cloud computing, investigation of data leakage, analysis of tracing systems, privacy preserving in cloud storage systems and the detection of explicit images. We kindly encourage attendees to attend the invited talk presentations and the six talks planned for the workshop. These valuable and insightful talks can present an interesting forum for the exchange of ideas in innovative disciplines related to network security and forensic investigation. In particular, the invited talk "Security Investigation in Wireless Networks", presented by Dr. Slim Rekhis, from the University of Carthage, Tunisia will discuss the challenges and recent developments in the digital investigation in wireless networks, while highlighting the importance of evidences collection, system visibility and anti-forensic detection.
Related Conferences (5)
Computer and Communications Security
3.9K papers, 261.6K citations
1K papers, 41.5K citations
Network and Distributed System Security Symposium
983 papers, 83.8K citations
Public Key Cryptography
871 papers, 41.7K citations
International Conference on the Theory and Application of Cryptology and Information Security
913 papers, 58.6K citations