1st Conference on Advances in Computer Security and Forensics (ACSF)


To be held at the School of Computing and Mathematical Sciences,
Liverpool John Moores University, Liverpool, UK

http://www.cms.livjm.ac.uk/acsf1/

13-14 July, 2006


Call for Papers

The 1st conference on Advances in Computer Security and Forensics (ACSF)
will take place at Liverpool John Moores University in July 2006. The
conference will draw a wide-range of participants from the national and
international research community as well as current practitioners within
the fields of computer security and computer forensics.

Computer security aims to preserve system integrity whilst computer
forensics aims to explain the cause for an event or set of events.
Computer security is an established field of computer science, whilst
forensic computing is an emergent area. Increasingly, computer security
will involve forensic investigation techniques, and vice versa, due to
the degree of overlap in raw material used by both fields. Therefore,
both fields have much to learn from each other. The purpose of this
conference is to bring together researchers and practitioners to present
and share the latest developments in research and applications in both
these fields.

This conference brings together academics, IT managers, system
administrators, security specialists, forensic practitioners, and anyone
interested in

 * the most advanced research in computer security and computer
   forensics
 * the latest developments in computer security and computer forensics
   applications
 * sharing views and experiences between academia and practitioners.

The conference will be organised into a number of tracks for both
academia and industry, which include refereed paper presentations, panel
discussions and invited talks based on the submissions received and the
interests expressed. The topics below are for guidance only and not as
an exhaustive list:

 * Intrusion Detection Systems
 * Wireless and ad hoc network security
 * Mobile agents for secure systems
 * Web security
 * Vulnerabilities and attacks
 * Distributed Denial-of-Service attack countermeasures
 * Network Security
 * Viruses and hostile code
 * Secure systems and network administration
 * Database security
 * Cryptography
 * Trust management
 * Privacy and anonymity
 * Digital Rights Management (DRM) and intellectual property
 * Access control, auditing and accountability
 * Incident Response and Management
 * Legal issues in computer forensics
 * Mobile device forensics
 * Collecting evidence
 * Network forensics
 * Practitioner case studies


Paper Submission

Authors are hereby invited to submit original papers in Word or PDF
format. All papers must be in English and the length should not exceed
10 pages typeset in LNCS format. All paper submissions will be handled
electronically. Authors should e-mail a version of their paper to the
conference chair.

Papers will be evaluated based on their quality and relevance. Each
paper will be reviewed by independent reviewers, whose reviews will be
relayed to the corresponding author. All submissions are held in
confidentiality prior to publication in the proceedings.

Panel proposals should provide the scope of the panel and panel members.
Panel proposals will be evaluated by the program committee.

Accepted papers will be presented by their authors and will be published
in the conference proceedings.


Important Dates

Paper and panel submission: 1 May, 2006

Notification of acceptance: 1 June, 2006

Final version of the paper due: 15 June, 2006


Conference Chair

Dr John Haggerty, Liverpool John Moores University. J.Haggerty@ljmu.ac.uk
Prof Madjid Merabti, Liverpool John Moores University. M.Merabti@ljmu.ac.uk