Abbrevation
SEC
City
Milano
Country
Italy
Deadline Paper
Start Date
End Date
Abstract

<P>The conference seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of computer security, as well as case studies and implementation experiences&#046; Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems&#046; Theoretical papers must make convincing argument for the practical significance of the results&#046;<BR></P> <P><B>Keywords:</B> &#8211; access control<BR>&#8211; accounting and audit<BR>&#8211; anonymity<BR>&#8211; applied cryptography<BR>&#8211; authentication<BR>&#8211; computer forensics<BR>&#8211; cryptographic protocols<BR>&#8211; database security<BR>&#8211; data protection<BR>&#8211; data/system integrity<BR>&#8211; digital rights management<BR>&#8211; electronic frauds<BR>&#8211; identity management<BR>&#8211; information warfare<BR>&#8211; intrusion detection<BR>&#8211; key management<BR>&#8211; law and ethics<BR>&#8211; peer&#8211;to&#8211;peer security<BR>&#8211; privacy&#8211;enhancing technology<BR>&#8211; secure location services<BR>&#8211; secure networking<BR>&#8211; security education<BR>&#8211; security management<BR>&#8211; smartcards<BR>&#8211; commercial and industry security<BR>&#8211; data and application security<BR>&#8211; inference/controlled disclosure<BR>&#8211; risk analysis and risk management<BR>&#8211; intellectual property protection<BR>&#8211; security in IT outsourcing<BR>&#8211; security for mobile code<BR>&#8211; trust management<BR>&#8211; trust models<BR></P>