(mobo import Concept___Fix_Presence-migrated) |
Curator 91 (talk | contribs) |
||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
+ | |Acronym=ACSAC 2016 | ||
+ | |Title=32nd Annual Computer Security Applications Conference | ||
+ | |Ordinal=32 | ||
+ | |In Event Series=Event Series:ACSAC | ||
+ | |Single Day Event=no | ||
+ | |Start Date=2016/12/05 | ||
+ | |End Date=2016/12/09 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=on site | ||
+ | |City=Los Angeles | ||
+ | |State=California | ||
+ | |Country=Country:US | ||
+ | |Academic Field=Computer Reliability; Computer Security | ||
+ | |Official Website=https://www.acsac.org/2016/ | ||
|Submission deadline=2016/06/01 | |Submission deadline=2016/06/01 | ||
|Abstract deadline=2016/09/01 | |Abstract deadline=2016/09/01 | ||
|Poster deadline=2016/09/01 | |Poster deadline=2016/09/01 | ||
|Workshop deadline=2016/06/01 | |Workshop deadline=2016/06/01 | ||
− | |||
|Type=Conference | |Type=Conference | ||
− | |||
− | |||
− | |||
|Year=2016 | |Year=2016 | ||
|Homepage=https://www.acsac.org/2016/cfp/ | |Homepage=https://www.acsac.org/2016/cfp/ | ||
− | |||
− | |||
|pageCreator=Liy1 | |pageCreator=Liy1 | ||
|pageEditor=User:Curator 27 | |pageEditor=User:Curator 27 | ||
|contributionType=1 | |contributionType=1 | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. | ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. | ||
==Topics== | ==Topics== | ||
− | * Access Control | + | *Access Control |
− | * Applied Cryptography | + | *Applied Cryptography |
− | * Assurance | + | *Assurance |
− | * Audit | + | *Audit |
− | * Biometrics | + | *Biometrics |
− | * Case studies | + | *Case studies |
− | * Cloud Security | + | *Cloud Security |
− | * Cyber-Physical Systems | + | *Cyber-Physical Systems |
− | * Denial of Service Protection | + | *Denial of Service Protection |
− | * Distributed Systems Security | + | *Distributed Systems Security |
− | * Electronic Commerce | + | *Electronic Commerce |
− | * Enterprise Security Management | + | *Enterprise Security Management |
− | * Evaluation and Compliance | + | *Evaluation and Compliance |
− | * Forensics | + | *Forensics |
− | * Identity Management | + | *Identity Management |
− | * Incident Response Planning | + | *Incident Response Planning |
− | * Insider Threat protection | + | *Insider Threat protection |
− | * Integrity | + | *Integrity |
− | * Intrusion Detection | + | *Intrusion Detection |
− | * Intellectual Property | + | *Intellectual Property |
− | * Malware | + | *Malware |
− | * Mobile/Wireless Security | + | *Mobile/Wireless Security |
− | * Multimedia Security | + | *Multimedia Security |
− | * Network Security | + | *Network Security |
− | * OS Security | + | *OS Security |
− | * P2P Security | + | *P2P Security |
− | * Privacy & Data Protection | + | *Privacy & Data Protection |
− | * Privilege Management | + | *Privilege Management |
− | * Resilience | + | *Resilience |
− | * Security and Privacy of the Internet of Things [https://www.acsac.org/2016/cfp/hardtopic/ Hard Topic Theme!] | + | *Security and Privacy of the Internet of Things [https://www.acsac.org/2016/cfp/hardtopic/ Hard Topic Theme!] |
− | * Security Engineering | + | *Security Engineering |
− | * Software Security | + | *Software Security |
− | * Supply Chain Security | + | *Supply Chain Security |
− | * Trust Management | + | *Trust Management |
− | * Trustworthy Computing | + | *Trustworthy Computing |
− | * Usability and Human-centric Aspects of Security | + | *Usability and Human-centric Aspects of Security |
− | * Virtualization Security | + | *Virtualization Security |
− | * Web Security | + | *Web Security |
==Submissions== | ==Submissions== | ||
Line 70: | Line 71: | ||
==Committees== | ==Committees== | ||
− | * Co-Organizers | + | *Co-Organizers |
− | * General Co Chairs | + | *General Co Chairs |
− | ** [[has general chair::some person]], some affiliation, country | + | **[[has general chair::some person]], some affiliation, country |
− | * PC Co Chairs | + | *PC Co Chairs |
− | ** [[has program chair::some person]], some affiliation, country | + | **[[has program chair::some person]], some affiliation, country |
− | * Workshop Chair | + | *Workshop Chair |
− | ** [[has workshop chair::some person]], some affiliation, country | + | **[[has workshop chair::some person]], some affiliation, country |
− | * Panel Chair | + | *Panel Chair |
− | ** [[has OC member::some person]], some affiliation, country | + | **[[has OC member::some person]], some affiliation, country |
− | * Seminars Chair | + | *Seminars Chair |
− | ** [[has tutorial chair::some person]], some affiliation, country | + | **[[has tutorial chair::some person]], some affiliation, country |
− | * Demonstration Co Chairs | + | *Demonstration Co Chairs |
− | ** [[has demo chair::some person]], some affiliation, country | + | **[[has demo chair::some person]], some affiliation, country |
− | ** [[has demo chair::some person]], some affiliation, country | + | **[[has demo chair::some person]], some affiliation, country |
− | * Local Organizing Co Chairs | + | *Local Organizing Co Chairs |
− | ** [[has local chair::some person]], some affiliation, country | + | **[[has local chair::some person]], some affiliation, country |
− | * Program Committee Members | + | *Program Committee Members |
− | ** [[has PC member::some person]], some affiliation, country | + | **[[has PC member::some person]], some affiliation, country |
Revision as of 14:14, 13 September 2022
The document "ACSAC 2016" was published on "2023-02-22T09:46:14" on the website "ConfIDent" under the URL https://confident-conference.org/index.php/Event:ACSAC 2016.
The document "ACSAC 2016" describes an event in the sense of a conference.
The document "ACSAC 2016" contains information about the event "ACSAC 2016" with start date "2016/12/05" and end date "2016/12/09".
The event "ACSAC 2016" is part of the event series identified by [[Event Series:ACSAC]]
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
Topics
- Access Control
- Applied Cryptography
- Assurance
- Audit
- Biometrics
- Case studies
- Cloud Security
- Cyber-Physical Systems
- Denial of Service Protection
- Distributed Systems Security
- Electronic Commerce
- Enterprise Security Management
- Evaluation and Compliance
- Forensics
- Identity Management
- Incident Response Planning
- Insider Threat protection
- Integrity
- Intrusion Detection
- Intellectual Property
- Malware
- Mobile/Wireless Security
- Multimedia Security
- Network Security
- OS Security
- P2P Security
- Privacy & Data Protection
- Privilege Management
- Resilience
- Security and Privacy of the Internet of Things Hard Topic Theme!
- Security Engineering
- Software Security
- Supply Chain Security
- Trust Management
- Trustworthy Computing
- Usability and Human-centric Aspects of Security
- Virtualization Security
- Web Security
Submissions
Important Dates
Committees
- Co-Organizers
- General Co Chairs
- some person, some affiliation, country
- PC Co Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country