[asterisk-security] Call for Participation - ACM Conference on Computer and Communications Security (CCS)

Christopher Kruegel chris at cs.ucsb.edu
Thu Sep 24 14:23:11 CDT 2009


============================================================
Please excuse multiple copies of this message.
============================================================
CALL FOR PARTICIPATION

ACM Conference on Computer and Communications Security (CCS)
Nov 9 - 13, 2009: Hyatt Regency Chicago, IL, USA
http://sigsac.org/ccs/CCS2009
============================================================
Student Travel Grants application for CCS 2009 is due on Sept 25!
http://www.sigsac.org/ccs/CCS2009/stgrant.shtml
============================================================
OPENING KEYNOTE

Dorothy Denning
Distinguished Professor, Department of Defense Analysis
Naval Postgraduate School
============================================================
TECHNICAL PROGRAM HIGHLIGHTS

Featuring 58 technical papers, on Applied Cryptography, Attacks, RFID,
Privacy, Anonymization, Formal Techniques, Cloud Security, Security of
Mobile Services, Security for Embedded and Mobile Devices, Systems and
Networks Security, Software Security, Designing Secure Systems,
Malware and Bots topics. The program also includes 5 tutorials, 12
workshops, and poster/demo session.
============================================================
TUTORIALS

* Tutorial 1: Cyber Security For The Power
   Grid Mel Gehrs (Gehrs Consulting), Himanshu Khurana (UIUC), and
   Andrew Wright (N-Dimension Solutions)

* Tutorial 2: An introduction to usable security
   Jeff Yan (Newcastle University)

* Tutorial 3: Security Risk Analysis of Computer Networks: Techniques
   and Challenges
   Anoop Singhal (NIST) and Xinming Ou (Kansas State University)

* Tutorial 4: Securing Wireless Systems
   Panos Papadimitratos (EPFL)

* Tutorial 5: WebAppSec.php: Developing Secure Web Applications
   Robert Zakon (Consultant)
============================================================
WORKSHOPS

* Assurable and Usable Security Configuration
* Digital Rights Management
* Virtual Machine Security
* Security and Artificial Intelligence
* Secure Execution of Untrusted Code
* Privacy in the Electronic Society
* Cloud Computing Security
* Digital Identity Management
* Information Security Governance
* Scalable Trusted Computing
* Secure Web Services
* Security and Privacy in Medical and Home-Care Systems
============================================================
If you register for one workshop, you can attend any other workshops
in the same day.  Registration for short tutorial is included in the
conference registration fees.
============================================================



More information about the asterisk-security mailing list