January 20 - 23 2014, Auckland, New Zealand
AISC aims at promoting research on all aspects of information security and increasing communication between academic and industrial researchers working in this area. We seek submissions from academic and industrial researchers on all theoretical and practical aspects of information security.
Suggested topics include, but are not restricted to: access control; anonymity and pseudonymity; cryptography and cryptographic protocols; database security; identity management and identity theft; intrusion detection and prevention; malicious software; network security; privacy enhancing technologies; and trust and risk.
Important Dates
Paper submission
12 August 2013 26th August 2013
Author notification 8 October 2013
Final version
29 October 2013 4th November
Author registration 4 November 2013
Early bird registration ends 2 December 2013
Conference dates 20 January - 23 January, 2014
Call for Papers
The
call for papers is available now.
All submissions must be original work, not previously published elsewhere, and not currently submitted to any other conference or journal. Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will attend the conference to present the work. Presentations will be 15 minutes in duration. Note that it is insufficient for an author to register and pay for the conference to be regarded as fulfilling this obligation.
As with previous years, registration for ACSW will enable delegates to attend sessions in any conference participating in the Australasian Computer Science Week.
The proceedings of this event will be published by the Australian Computer Society (ACS) in the CRPIT Series.
There will be an award for the best student paper. A paper categorized as a ``student paper'' should be marked with ``Student Paper'' at the top of the anonymous submission. The definition of a ``student paper'' is a paper where at least 75% of the work is done by the student (and usually, the student's name appears as the first author).
Papers will be judged on originality, significance, correctness and clarity. The contribution of the paper should be clearly explained in both general and technical terms. Submission of a paper includes a commitment that, should the paper be accepted, at least one author will attend the workshop to present the work.
Papers must be submitted electronically and be received by the submission deadline. Late submissions and non-electronic submissions will not be considered.
Please ensure that your paper is a suitably anonymised pdf document, and meets the requirements for double-blind reviewing, see section below.
Submission of papers will be managed through EasyChair,
http://www.easychair.org/conferences/?conf=acswaisc2014, a comprehensive conference paper management system. First create your own account there then login and follow the prompts to submit your anonymous paper for double blind reviewing. If there are any issues with submission, please email
acswaisc2014@easychair.org.
Double-blind Reviewing Requirements
It is standard practice that identities of reviewers are not made known to authors. The double-blind review process extends this principle so that reviewers do not know the identity of authors. This process requires authors to refrain from identifying themselves in their own paper. Below are some considerations to keep in mind:
- In place of the usual author and address details, put "Author details suppressed"; or something equivalent. Where there are more than three authors contributing to a paper, limit the number of author spaces to three in the anonymised version.
- Refrain from references to your university or campus by name. If you feel that a description of your university is in some way salient to the paper, use generalities. For example, use "our University" instead of "Maintown University of Technology".
- Do not cite more than one of your past papers. Remember that authors will have the opportunity to revise their accepted paper before they are printed, so you will be able to add such information into the revised version. Avoid expressions like "In earlier work we …" followed by a citation of a paper authored by yourself.
- If you have an acknowledgements section, omit it for the blind submission.
- Once you have a pdf copy of your paper, see how well it is blinded. Some pdf creation software includes document properties such as the author name or institution. Some operating systems will show such document properties in the PDF version. Be especially careful to disguise or remove these properties.
In general, apply good judgement when preparing your submission, to maintain the integrity of the double-blind process. Submissions that allow the author to be identified may be returned to you for editing, or may be edited by the program chairs to remove the specific identifying material.
Guidelines for Authors
Note that for the initial submission that a single column format is acceptable (as specified in the CFP), you will need to conform to the formatting guidelines below if accepted.
Papers must be between 4 and 10 pages long (sans reference and Appendix), and 20 page limit (total overall). Papers are required to conform to the formatting guidelines of the series
Conferences in Research and Practice in Information Technology (CRPIT). See the
Procedures and Resources for Authors Submitting to CRPIT Published Conferences and Workshops.
The accepted format for submissions is Portable Document Format (PDF). Microsoft Word and Latex template files are available at the CRPIT web site.
By submitting to the conference, authors accept that they are aware of the
Guidelines on Research Practice in Computer Science by the Computer Research and Education Association (CORE). In particular, authors are encouraged to review the points on authorship.
Copyright Statement
The copyright statement at the foot of page 1 should include the following details. Note that the volume number will be supplied before camera ready papers are submitted, which is after initial submission and acceptance.
Copyright (c) 2014, Australian Computer Society, Inc. This paper appeared at the Australasian Information Security Conference (ACSW-AISC 2014), Auckland, New Zealand, January 2014. Conferences in Research and Practice in Information Technology (CRPIT), Vol. XXX. U. Parampalli and I. Welch Eds. Reproduction for academic, not-for profit purposes permitted provided this text is included.
Assuming the CRPITStyle file is being used, the LaTeX source should include something like:
\newcommand\conferencenameandplace{Australasian Information Security Conference(ACSW-AISC 2014), Auckland, New Zealand, January 2014}
\newcommand\volumenumber{XXX}
\newcommand\conferenceyear{2014}
\newcommand\editorname{Udaya Parampalli and Ian Welch}
\toappearstandard
Programme Committee
- Lynn Batten, Deakin University, Melbourne, Australia
- Serdar Boztas, RMIT, Australia
- Philip Branch, Swinburne, Australia
- Ljiljana Brankovic, Newcastle University, Australia
- Raymond Choo, University of South Australia, Australia
- Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
- Feng Hao, University of Newcastle upon Tyne, UK
- Dong Seong Kim, Canterbury University, New Zealand
- Peter Komisarczuk, Thames Valley University, United Kingdom
- Chris Mitchell, Royal Holloway, University of London, United Kingdon
- Paul Montague, DSTO, Australia
- Steven Galbraith, University of Auckland, New Zealand
- Juan Gonzalez Nieto, Queensland University of Technology, Australia
- Udaya Parampalli, Melbourne University, Australia
- Josef Pieprzyk, Macquarie University, Australia
- Giovanni Russello, Auckland University, New Zealand
- Jill Slay, University of South Australia, Australia
- Ron Steinfeld, Monash, Australia
- Willy Susilo, University of Wollongong, Australia
- Clark Thomborson, Auckland University, New Zealand
- Ian Welch, Victoria University of Wellington New Zealand
- Duncan S. Wong, City University of Hong Kong, Hong Kong
- Yang Xiang, Deakin University, Australia
- Xun Yi, Victoria University, Australia
Please see
ACSW 2014 web page.
Conference Program
To be announced in November 2014.
For any queries, please contact
Udaya Parampalli (contact
udaya@unimelb.edu.au) or
Ian Welch (contact
ian.welch@vuw.ac.nz).