3rd Conference on
          * Advances in Computer Security and Forensics *

   Sponsored by the Institution of Engineering and Technology (IET)

                          *Call for Papers*

                         To be held at the
           School of Computing and Mathematical Sciences
          Liverpool John Moores University, Liverpool, UK


                          10-11 July, 2008


Building on successful conferences in previous years, the 3rd
Conference on Advances in Computer Security and Forensics (ACSF)
will take place at Liverpool John Moores University in July 2008.
The conference, sponsored by the Institution of Engineering and
Technology (IET) and taking place during Liverpool's reign as
European Capital of Culture, will draw a wide-range of participants
from the national and international research community as well as
current practitioners within the fields of computer security and
computer forensics.

Today's wide scale adoption of technology has brought many social
and cultural benefits. Yet, it harbours many technical and social
challenges. At the forefront of these is the protection of our
systems and the public. Computer security aims to preserve a
system's confidentiality, integrity and availability through a wide
range of countermeasures. Computer forensics, on the other hand,
attempts to ascribe culpability or responsibility for an event or
set of events. There is a degree of overlap in the material used by
both fields, albeit for different purposes. Therefore, both fields
have much commonality and differences that may be shared to the
benefit of their respective disciplines.

The purpose of this conference is to bring together academics,
researchers, IT managers, system administrators, security
specialists, forensic practitioners and other interested parties to
share the latest developments in research and applications from
both fields. The conference affords academics, researchers and
practitioners the opportunity to share views and experiences in
these fields.

The conference is organised into a number of tracks led by both
academics and practitioners to discuss the latest developments in
computer security and computer forensics applications. These will
include refereed paper presentations, panel discussions and invited
talks based on the submissions received and the interests
expressed. The topics below are for guidance only and not as an
exhaustive list:

  * Incident Response and Management
  * Legal issues in computer forensics
  * Mobile phone and PDA forensics
  * Collecting digital evidence
  * Network forensics
  * Computer forensics case studies
  * Storage media and file forensic techniques
  * Multimedia source identification
  * Data carving and data mining
  * Fraud investigation techniques
  * Intrusion Detection Systems
  * Wireless and ad hoc network security
  * Mobile agents for secure systems
  * Mobile device and mobile phone security
  * Network Security
  * Viruses, hostile code and Denial of Service
  * Trusted computing
  * Trust and resilience
  * Privacy and anonymity
  * Access control, auditing and accountability

Paper Submission

Authors are hereby invited to submit original papers in Word or
LaTeX format. All papers must be in English and the length should
not exceed 8 pages typeset in IEEE format. All paper submissions
will be handled electronically.

Papers will be evaluated based on their quality and relevance. Each
paper will be reviewed by independent reviewers, whose reviews will
be relayed to the corresponding author. All submissions are held in
confidentiality prior to publication in the proceedings. Panel
proposals should provide the scope of the panel and panel members.
Panel proposals will be evaluated by the programme committee.

Accepted papers will be presented by their authors and will be
published in the conference proceedings.

Important Dates

Paper and panel submission: 25 April, 2008
Notification of acceptance: 23 May, 2008
Final version of the paper due: 9 June, 2008

Conference Chairs

Dr John Haggerty, Liverpool John Moores University.
Prof Madjid Merabti, Liverpool John Moores University.

Provisional TPC

Qi Shi, Liverpool John Moores University
Bob Askwith, Liverpool John Moores University
Chris Laing, Northumbria University
Tewfiq El Maliki, EIG Labo-Telecom, Switzerland
Ross Patel, AFENTIS
Anastasia Konstadopoulou, University of Bradford
Bill Buchanan, Napier University
Henrik Kiertzner, Arup Consulting
Nimal Nissanke, London South Bank University
Steve Furnell, University of Plymouth
Grahame Cooper, University of Salford
John Mellor, University of Bradford
Anirach Mingkhwan, King Mongkut's Institute of Technology, Thailand
Pete Daniel, SELEX Communications
Geoff Conway, Merseyside Police

Web site