ACM TISSEC Topics of Interest


Security Technologies: authentication; authorization models and mechanisms; auditing and intrusion detection; cryptographic algorithms, protocols, services, and infrastructure; recovery and survivable operation; risk analysis; assurance including cryptanalysis and formal methods; penetration technologies including viruses, Trojan horses, spoofing, sniffing, cracking, and covert channels.

Secure Systems: secure operating systems, database systems and networks; secure distributed systems including security middleware; secure web browsers, servers, and mobile code; specialized secure systems for specific application areas; interoperability, and composition.

Security Applications: threats, system tradeoffs, and unique needs of applications; representative application areas include information systems, workflow, electronic commerce, electronic cash, copyright and intellectual property protection, telecommunications systems, wireless systems, and health care.

Security Policies: confidentiality, integrity, availability, privacy, usage, and survivability policies; tradeoffs, conflicts and synergy among security objectives.

Note: Submissions on watermarking or steganography are currently out of scope of interest for ACM TISSEC.