ACM Logo

SAC 2010
The 25th ACM Symposium on Applied Computing
22 – 26 March 2010, Sierre, Switzerland
Track on Information Security Research and Applications


Guido Schryen (primary contact)
RWTH Aachen University, Germany

Peter Otto
Union Graduate College, USA

Eliot Rich
University at Albany, SUNY, USA

Wm. Arthur Conklin
University of Houston, USA

(As of 6 July 2009)

Rainer Boehme
TU Dresden, Germany

Elisa Bertino
Purdue University, USA

Nicolas Christin
Carnegie Mellon University, USA

Jason Crampton
University of London, UK

Ramzi El-Haddadeh
Brunel University, UK

Hannes Federrath
University of Regensburg, Germany

Simone Fischer-Hübner
Karlstad University, Sweden

Felix Freiling
University of Mannheim, Germany

Jens Grossklags
UC Berkeley, USA

Somesh Jha
University of Wisconsin, USA

Lutz Kolbe
University of Goettingen, Germany

Christian Kreibich
International Computer Science Institute, Berkeley, USA

Robert Krimmer
Competence Center for Electronic Voting and Participation, Austria

Phil Laplante
Penn State University, USA

Michael Lesk
Rutgers University, USA

Tim Lindquist
Arizona State University, USA

Patrick McDaniel
Penn State University, USA

Ulrike Meyer
RWTH Aachen, Germany

Tyler Moore
Harvard University, USA

Oleg Pavlov
Worcester Polytechnic Institute, USA

Slobodan Petrović
Gjøvik University College, Norway

Ahmad-Reza Sadeghi
Ruhr-University Bochum, Germany

Frederick Sheldon
Oak Ridge National Laboratory, USA

Stelios Sidiroglou

Robin Sommer
International Computer Science Institute, Berkeley, USA

Joseph Tront
Virginia Tech, USA

Gregory White
University of Texas at San Antonio, USA

Marianne Winslett
University of Illinois, USA

Stephen D. Wolthusen
Gjøvik University College, Norway

SAC 2010

For the past twenty-four years, the ACM Symposium on Applied Computing has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the world. SAC 2010 is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP), and is hosted by University of Applied Sciences, Western Switzerland (HES-SO) and Ecole Polytechnique fédérale de Lausanne (EPFL), Switzerland. The conference proceedings are published by ACM and are also available online through ACM Digital Library. For additional information, please check the SAC web page

Track on Information Security Research and Applications (CfP PDF)


As society becomes more reliant on information systems, networks, and mobile communication, we become more vulnerable to security incidents. Our critical infrastructures for energy, communication, and transportation are interconnected via the Internet, bringing with this the efficiencies and economies of scale and the risk associated with open networks.  It has turned out that economic and societal interests go beyond technical security, as they also relate to organizational and behavioral security facets. This track provides a venue for holistic security issues related to detecting, mitigating and preventing the threat of attacks against information and communication systems. It brings together security researchers from the areas of computer science, information systems and systems science who are otherwise spread over multiple conferences.


Papers that address improving the security of information system-reliant organizations from threats through technical, organizational, or behavioral change are encouraged. These may include simulation studies, case-based research, empirical studies, and other applications of quantitative and qualitative methods. Topics include, but are not limited to:

  • Internet security
  • Economics of information security
  • Identifying modes of misuse
  • Applications of access policies
  • Analysis of known and unknown modes of attack
  • Detecting and mitigating insider threats
  • Modeling risks and approaches to mitigation
  • Teaching and training security and business managers about information security
  • Creating channels and techniques to share confidential information
  • Modeling and theory building of security issues
  • Insider threats
  • Social and business security policy
  • Intrusion detection/prevention
  • Electronic commerce security and privacy
  • Secure software development
  • Electronic voting
  • Security metrics
  • Risk and fraud assessment
  • Trust
  • Process Control Systems / SCADA security

Important Due Dates

  • Paper submission:   Sept. 8, 2009 Sept. 15, 2009
  • Author notification:   Oct. 19, 2009
  • Camera-Ready Copy:  Nov. 2, 2009


Only full papers about original and unpublished research are sought. Papers should not be submitted to other SAC 2010 tracks in parallel. They should also not be under review in any other conference or journal. All submissions must be formatted using the ACM conference-specific style, which can be obtained from the symposium web page. The standard extension of a submission in the stated format is 5 pages (approximately 5000 words). Longer papers (up to 8 pages maximum) will imply an additional charge of 80USD per page. Authors must register their intent to submit a paper using the conference management system, eCMS system at Authors will use this system for formal paper submission and other correspondence.

Track Chairs

Guido Schryen (primary contact)
Institute of Business Information Systems
RWTH Aachen University
Templergraben 64
52062 Aachen, Germany
Phone: +49 (241) 80-96193 or +1 (510) 666 2972
Fax:  +49 (241) 80-92702 or +1 (510) 666 2956

Peter Otto
Union Graduate College
School of Management
807 Union Street
Schenectady, NY 12308, USA
Phone:  +1 (518) 388-7153

Eliot Rich
Department of Information Technology Management
BA 310
University of Albany, SUNY
Albany, NY 12222, USA
Phone: +1 (518) 442-4944
Fax: +1 (518) 442-2568

Wm. Arthur Conklin
Department of Information and Logistics Technology
University of Houston
300 Technology Building
Houston, TX 77204, USA
Phone: +1 (713) 743-1556