Call for Papers: 10th ACM Conference on Data and Application Security and Privacy
Call for Papers
10th ACM Conference on Data and Application Security and Privacy
March 16 - 18, 2020
New Orleans, LA
http://www.codaspy.org/2020/
Data and application security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Application Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area.
The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security
CODASPY 2020 will also feature a dataset and tool paper track, which will provide a unique venue for researchers and practitioners to make available and citable their work done to achieve datasets or tools relevant in security and privacy domain. Papers accepted in this track have to describe the available datasets or reporting on the design and implementation of application security and privacy tools. Dataset/tool papers are limited to 5 pages.
Instructions for Research Paper Authors
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.
Submissions must be at most 12 pages in double-column ACM format (as specified at ACM Proceedings Template linked here). Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines will be rejected without review.
Submissions should be made electronically at EasyChair CODASPY 2020 (linked here).
Instructions for Dataset/Tool Paper Authors
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.
Submissions must be at most 5 pages in double-column ACM format (as specified at ACM Proceedings Template linked here). Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted. Submissions not meeting these guidelines will be rejected without review.
Submissions should be made electronically at EasyChair CODASPY 2020 (linked here).
Important Dates
- Abstract submission deadline: September 2, 2019, 23:59 anywhere in the world
- Research paper submission deadline: September 9, 2019, 23:59 anywhere in the world
- Dataset/tool paper submission deadline: September 9, 2019, 23:59 anywhere in the world
- Rebuttal phase: October 14-18, 2019
- Notification to (conference) authors: November 18, 2019
Organization
Program Co-Chairs
- Barbara Carminati, University of Insubria, Italy
- Murat Kantarcioglu, University of Texas at Dallas
Program Committee
- Irfan Ahmed, Virginia Commonwealth University
- Gail-Joon Ahn, Arizona State University
- Cuneyt Gurcan Akcora, The University of Texas at Dallas
- Vijay Atluri, Rutgers University
- Elisa Bertino, Purdue University
- Prosunjit Biswas, Anaplan Inc.
- Barbara Carminati, University of Insubria
- Yuan Cheng, California State University, Sacramento
- Pietro Colombo, University of Insubria
- Naranker Dulay, Imperial College London
- Elena Ferrari, University of Insubria
- Philip W. L. Fong, University of Calgary
- Debin Gao, Singapore Management University
- Maanak Gupta, Tennessee Tech University
- Hannes Hartenstein, Karlsruhe Institute of Technology
- Wei Jiang, University of Missouri
- Martin Johns, TU Braunschweig
- Murat Kantarcioglu, The University of Texas at Dallas
- Alexandros Kapravelos, North Carolina State University
- Adam J. Lee, University of Pittsburgh
- Qi Li, Tsinghua University
- Dan Lin, University of Missouri
- Brad Malin, Vanderbilt University
- Amirreza Masoumzadeh, University at Albany - SUNY
- Jaehong Park, University of Alabama in Huntsville
- Alexander Pretschner, Technical University of Munich
- Indrajit Ray, Colorado State University
- Vassil Roussev, University of New Orleans
- Huasong Shan, JD.com American Technologies Corporation
- Wenbo Shen, Zhejiang University
- Anna Squicciarini, The Pennsylvania State University
- Natalia Stakhanova, University of New Brunswick
- Hassan Takabi, University of North Texas
- Mahesh Tripunitara, University of Waterloo
- Wendy Hui Wang, Stevens Institute of Technology
- Roland Yap, National University of Singapore
- Kailiang Ying, Syracuse University
- Chuan Yue, Colorado School of Mines
- Yajin Zhou, Zhejiang University