Call for Submissions
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
If you are developing practical solutions to problems relating to protecting commercial enterprises' or countries' information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference.
We solicit submissions that address the application of security technology, the implementation of systems, and lessons learned. While we are interested in a variety of topics, we especially encourage submissions in the area of our Hard Topic Theme for 2014, Cybersecurity for Cyber-Physical Systems.
Format Description Deadline Notification
(tentative)Technical Track peer-reviewed papers on new work June 8, 2014 Aug. 15, 2014 Case Studies real-world security application reports June 8, 2014 Aug. 15, 2014 Panels interactive expert panels June 8, 2014 Aug. 15, 2014 Professional
Development
Coursesin-depth courses on current security topics June 8, 2014 July 19, 2014 Workshops 1-2 day sessions on hot topics June 8, 2014 Aug. 15, 2014 Posters new and innovative preliminary work Sept. 15, 2014 Sept. 30, 2014 Works in Progress short works-in-progress reports Sept. 15, 2014 Sept. 30, 2014 Conferenceships student grant requests Sept. 15, 2014 Oct. 15, 2014
Submission Formats:
Technical Track Paper Submissions (contact Program Chair)
- Kevin Butler, University of Florida (Program Chair)
- Micah Sherr, Georgetown University (Program Co-Chair)
Case Studies in Applied Security (contact Case Studies Chair)
- Larry Wagoner, NSA (Case Studies Chair)
Professional Development Courses (contact Professional Development Chair)
- Daniel Faigin, The Aerospace Corporation, USA. (Professional Development Chair)
Panels (contact Panels Chair)
- Hassan Takabi, University of Pittsburgh (Panels Chair)
Workshops (contact Workshops Chair)
- Harvey Rubinovitz, The MITRE Corporation (Workshops Chair)
Posters (contact Posters Chair)
- Raheem Beyah, Georgia Institute of Technology (Posters Chair)
Works In Progress (contact WIP Chair)
- Raheem Beyah, Georgia Institute of Technology (WiP Chair)
Conferenceship Grants
ACSAC offers conferenceships to enable students to attend the conference. This program will help pay for some of the cost to attend ACSAC. Additional information about this program is available on the Student Awards page.
Additional Information
ACSAC does not accept "speaking proposals" per se, however; you are encouraged to submit suggestions in the form of a one paragraph description of a topic and a biography of the proposed presenter. Depending on a proposal's technical content, it may be acceptable as a case study. If a full paper is available, it may be acceptable as a technical paper. If a presentation by a group of related speakers is contemplated, a proposal for this session may be acceptable as a panel or forum. If a proposal for a half day or full day seminar is appropriate, it may be acceptable as a tutorial. If a one or two page technical writeup is available that describes work that is not yet completed, it may be acceptable as a poster. Finally, if your have an interest in a full day interactive dialogue, exchanging ideas, opinions and concerns between multiple presenters and attendees, consider being a workshop presenter.
For More Information
- For general conference information, see the menu at left
- For refereed papers information: see our paper submission page
- For case studies information: see our case studies page
- For publicity information: contact the Publicity Chair
- For student paper/award information: see our student awards page
- For courses information: see our courses page
- For posters information: see our posters page
- For works in progress information: see our works in progress page
- For workshops: see our workshops page
About the Sponsor
Applied Computer Security Associates (ACSA) had its genesis in the first Aerospace Computer Security Applications Conference in 1985. That conference was a success and evolved into the Annual Computer Security Applications Conference (ACSAC). Several years ago the word "Aerospace" was dropped from the name to promote a wider range of government and commercial applications. ACSA was incorporated in 1987 as a non-profit association of computer security professionals who have a common goal of improving the understanding, theory, and practice of computer security. ACSA continues to be the primary sponsor of the annual conference.
In 1989, ACSA began the Distinguished Lecture Series at the annual conference. Each year, an outstanding computer security professional is invited to present a lecture of current topical interest to the security community. In 1991, ACSA began a Best-Paper by a Student Award, presented at the Annual conference. This award is intended to encourage active student participation in the annual conference. The award winning student author receives an honorarium and all expenses to the conference.
ACSA continues to be committed to serving the security community by finding additional approaches for encouraging and facilitating dialogue and technical interchange. ACSA is always interested in suggestions from interested professionals and computer security professional organizations on how to achieve these goals.