******************************************************************** 3rd Conference on * Advances in Computer Security and Forensics * (ACSF) Sponsored by the Institution of Engineering and Technology (IET) *Call for Papers* To be held at the School of Computing and Mathematical Sciences Liverpool John Moores University, Liverpool, UK http://www.cms.livjm.ac.uk/acsf3/ 10-11 July, 2008 ******************************************************************** Building on successful conferences in previous years, the 3rd Conference on Advances in Computer Security and Forensics (ACSF) will take place at Liverpool John Moores University in July 2008. The conference, sponsored by the Institution of Engineering and Technology (IET) and taking place during Liverpool's reign as European Capital of Culture, will draw a wide-range of participants from the national and international research community as well as current practitioners within the fields of computer security and computer forensics. Today's wide scale adoption of technology has brought many social and cultural benefits. Yet, it harbours many technical and social challenges. At the forefront of these is the protection of our systems and the public. Computer security aims to preserve a system's confidentiality, integrity and availability through a wide range of countermeasures. Computer forensics, on the other hand, attempts to ascribe culpability or responsibility for an event or set of events. There is a degree of overlap in the material used by both fields, albeit for different purposes. Therefore, both fields have much commonality and differences that may be shared to the benefit of their respective disciplines. The purpose of this conference is to bring together academics, researchers, IT managers, system administrators, security specialists, forensic practitioners and other interested parties to share the latest developments in research and applications from both fields. The conference affords academics, researchers and practitioners the opportunity to share views and experiences in these fields. The conference is organised into a number of tracks led by both academics and practitioners to discuss the latest developments in computer security and computer forensics applications. These will include refereed paper presentations, panel discussions and invited talks based on the submissions received and the interests expressed. The topics below are for guidance only and not as an exhaustive list: * Incident Response and Management * Legal issues in computer forensics * Mobile phone and PDA forensics * Collecting digital evidence * Network forensics * Computer forensics case studies * Storage media and file forensic techniques * Multimedia source identification * Data carving and data mining * Fraud investigation techniques * Intrusion Detection Systems * Wireless and ad hoc network security * Mobile agents for secure systems * Mobile device and mobile phone security * Network Security * Viruses, hostile code and Denial of Service * Trusted computing * Trust and resilience * Privacy and anonymity * Access control, auditing and accountability Paper Submission ================ Authors are hereby invited to submit original papers in Word or LaTeX format. All papers must be in English and the length should not exceed 8 pages typeset in IEEE format. All paper submissions will be handled electronically. Papers will be evaluated based on their quality and relevance. Each paper will be reviewed by independent reviewers, whose reviews will be relayed to the corresponding author. All submissions are held in confidentiality prior to publication in the proceedings. Panel proposals should provide the scope of the panel and panel members. Panel proposals will be evaluated by the programme committee. Accepted papers will be presented by their authors and will be published in the conference proceedings. Important Dates =============== Paper and panel submission: 25 April, 2008 Notification of acceptance: 23 May, 2008 Final version of the paper due: 9 June, 2008 Conference Chairs ================= Dr John Haggerty, Liverpool John Moores University. J.Haggerty@ljmu.ac.uk Prof Madjid Merabti, Liverpool John Moores University. M.Merabti@ljmu.ac.uk Provisional TPC =============== Qi Shi, Liverpool John Moores University Bob Askwith, Liverpool John Moores University Chris Laing, Northumbria University Tewfiq El Maliki, EIG Labo-Telecom, Switzerland Ross Patel, AFENTIS Anastasia Konstadopoulou, University of Bradford Bill Buchanan, Napier University Henrik Kiertzner, Arup Consulting Nimal Nissanke, London South Bank University Steve Furnell, University of Plymouth Grahame Cooper, University of Salford John Mellor, University of Bradford Anirach Mingkhwan, King Mongkut's Institute of Technology, Thailand Pete Daniel, SELEX Communications Geoff Conway, Merseyside Police Web site ======== http://www.cms.livjm.ac.uk/acsf3/