<P>The conference seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of computer security, as well as case studies and implementation experiences. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make convincing argument for the practical significance of the results.<BR></P> <P><B>Keywords:</B> – access control<BR>– accounting and audit<BR>– anonymity<BR>– applied cryptography<BR>– authentication<BR>– computer forensics<BR>– cryptographic protocols<BR>– database security<BR>– data protection<BR>– data/system integrity<BR>– digital rights management<BR>– electronic frauds<BR>– identity management<BR>– information warfare<BR>– intrusion detection<BR>– key management<BR>– law and ethics<BR>– peer–to–peer security<BR>– privacy–enhancing technology<BR>– secure location services<BR>– secure networking<BR>– security education<BR>– security management<BR>– smartcards<BR>– commercial and industry security<BR>– data and application security<BR>– inference/controlled disclosure<BR>– risk analysis and risk management<BR>– intellectual property protection<BR>– security in IT outsourcing<BR>– security for mobile code<BR>– trust management<BR>– trust models<BR></P>
Abbrevation
SEC
City
Milano
Country
Italy
Deadline Paper
Start Date
End Date
Abstract