Maintained by:

Institute for         Cyber Security   UTSA

Announcement

ACM SIGSAC announces the continuation of its recently launched annual ACM Conference on Data and Applications Security.  The fourth conference will be held March 3-5, 2014 in Hyatt Regency, San Antonio, TX.

About

With rapid global penetration of the Internet and smart phones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyber infrastructure. Criminals, spies and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy has become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers. This new conference provides a dedicated venue for high-quality research in this arena, and seeks to foster a community with this focus in cyber security.

Awards

Best Paper Award

RiskMon: Continuous and Automated Risk Assessment for Mobile Applications Yiming Jing; Gail-Joon Ahn; Ziming Zhao (Arizona State U); Hongxin Hu (Delaware State U)

Outstanding Paper Awards

On the Suitability of Dissemination-centric Access Control Systems for Group-centric Sharing William C.  Garrison III; Yechen Qiao; Adam J. Lee (University of Pittsburgh)

An Efficient Privacy-Preserving System for Monitoring Mobile Users: Making Searchable Encryption Practical Gabriel Ghinita (University of Massachusetts, Boston); Razvan Rughinis (University Politehnica of Bucharest)

Best paper award committee

Elena Ferrari
Murat Kantarcioglu
Alexander Pretschner

Best Poster award

Minimizing Lifetime of Sensitive Data in Concurrent Programs Kalpana Gondi; A. Prasad Sistla; Venkat Venkatakrishnan (University of Illinois at Chicago)

Outstanding Poster Awards

Securing OAuth Implementations In Smart Phones Mohamed Shehab; Fadi Mohsen (University of North Carolina at Charlotte)

A Modular Multi-Location Anonymized Traffic Monitoring Tool for a WiFi Network Justin Hummel; Andrew McDonald; Vatsal Shah; Riju Singh; Bradford D. Boyle; Tingshan Huang; Nagarajan Kandasamy; Harish Sethu; Steven Weber (Department of Electrical Engineering and Computer Engineering, Drexel University)