Security Technologies: authentication; authorization models and mechanisms; auditing and intrusion detection; cryptographic algorithms, protocols, services, and infrastructure; recovery and survivable operation; risk analysis; assurance including cryptanalysis and formal methods; penetration technologies including viruses, Trojan horses, spoofing, sniffing, cracking, and covert channels.
Secure Systems: secure operating systems, database systems and networks; secure distributed systems including security middleware; secure web browsers, servers, and mobile code; specialized secure systems for specific application areas; interoperability, and composition.
Security Applications: threats, system tradeoffs, and unique needs of applications; representative application areas include information systems, workflow, electronic commerce, electronic cash, copyright and intellectual property protection, telecommunications systems, wireless systems, and health care.
Security Policies: confidentiality, integrity, availability, privacy, usage, and survivability policies; tradeoffs, conflicts and synergy among security objectives.
Note: Submissions on watermarking or steganography are currently out of scope of interest for ACM TISSEC.