Wednesday, August 14, 2019

[DMANET] Security track at the 35th ACM SAC - Call for papers


The 19th edition of the Computer Security track at
the 35th ACM Symposium on Applied Computing
30th March - 3rd April 2020, Brno, Czech Republic

The Security Track reaches its 19th edition this year, thus appearing
among the most established tracks in the Symposium. Its acceptance rate
has become more and more selective. The list of issues remains vast,
ranging from protocols to work-flows. Topics of interest include but are
not limited to:

* software security (protocols, operating systems, etc.)
* hardware security (smartcards, biometric technologies, etc.)
* mobile security (properties for/from mobile agents, etc.)
* network security (anti-DoS tools, firewalls, real-time monitoring,
mobile networks, sensor networks, etc.)
* alternatives to cryptography (steganography, etc.)
* security-specific software development practices (vulnerability
testing, fault-injection resilience, etc.)
* privacy and anonymity (trust management, pseudonymity, identity
management, electronic voting, etc.)
* safety and dependability issues (reliability, survivability, etc.)
* cyberlaw and cybercrime (copyrights, trademarks, defamation,
intellectual property, etc.)
* security management and usability issues (security configuration,
policy management, usability trials etc.)
* workflow and service security (business processes, web services, etc.)
* security in cloud computing and virtualised environments
* blockchain applications and security analysis of existing cryptocurrencies
* security and privacy in the IoT


15th September 2019 Submission of regular papers and SRC research abstracts
10th November 2019 Notification of Acceptance/Rejection
25h November 2019 Camera-Ready copies of accepted papers and SRC
research abstracts
25h November 2019 Author registration due
30th March -3rd April 2020 SAC 2020 takes place


* Best papers of SEC@SAC03 in special issue of Concurrency and
Computation: Practice and Experience (Wiley), 16(1), 2004
* Best papers of SEC@SAC04 in special issue of the Journal of Computer
Security (IOS), 13(5), 2005
* Best papers of SEC@SAC06 in special issue of the Journal of Computer
Security (IOS), 17(3), 2009
* Best papers of SEC@SAC13 in special issue of the International Journal
of Information Security (Springer), 14(2), 2015

This practice will be continued on the basis of appropriateness of the

* Giampaolo BELLA (Dipartimento di Matematica e Informatica, Università
di Catania, Italy)
* Rosario GIUSTOLISI (IT University of Copenhagen, Denmark)

* Aslan Askarov (Aarhus University, Denmark)
* Tom Chothia (University of Birmingham, UK)
* Jannik Dreier (Université de Lorraine, France)
* Paul Duplys (Robert Bosch GmbH, Germany)
* Barbara Fila (INSA Rennes, IRISA, France)
* Simone Fischer-Hübner (Karlstad University, Sweden)
* Christian Gehrmann (Lund University, Sweden)
* Christian Hammer (Potsdam University, Germany)
* Lucca Hirschi (Inria & LORIA, France)
* Martin Johns (SAP Research, Germany)
* Erisa Karafili (Imperial College, UK)
* Sokratis Katsikas (Norwegian University of Science & Technology, Norway)
* Robert Künnemann (CISPA, Germany)
* Ilaria Matteucci (CNR, Italy)
* Chris Novakovic (University of Birmingham, UK)
* David Nowak (CNRS & Lille 1 University, France)
* Elizabeth Quaglia (Royal Holloway, UK)
* Alejandro Russo (Chalmers, Sweden)
* René Rydhof Hansen (Aalborg University, Denmark)
* Sebastian Schinzel (Muenster University of Applied Sciences, Germany)
* Helen Treharne (University of Surrey, UK)
* Melanie Volkamer (KIT, Germany)
* Ruoyu Wang (Arizona State University, USA)

The standard extension of a submission in the stated format is 8 pages.
Longer papers (up to 10 pages maximum) will imply an additional charge.

Graduate students are invited to submit research abstracts here (minimum
of 2-page and maximum of 4-page) following the instructions published at
SAC 2020 website. Submission of the same abstract to multiple tracks is
not allowed.

Contact: Giampaolo Bella,
* Contributions to be spread via DMANET are submitted to
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.