The 11th ACM Conference on Data and Application Security and Privacy (CODASPY)
Event submitted on Monday, August 3rd 2020, approved by Content Team ✓
This event has been tagged as follows:
Taking place (I believe) in the UMBC Center for Cybersecurity, this is an excellent opportunity to learn everything that there is to regarding privacy. We cover a lot of privacy cybersecurity conferences and this one jumps-out as being absolutely rammed full of actionable and contemporary info regarding the ever-important and expanding subject-matter of data privacy.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Monday, August 3rd 2020, or created by us.
With rapid global penetration of the Internet and smartphones and the resulting productivity and social gains, the world is becoming increasingly dependent on its cyberinfrastructure.
Criminals, spies, and predators of all kinds have learned to exploit this landscape much quicker than defenders have advanced in their technologies. Security and Privacy have become an essential concern of applications and systems throughout their lifecycle. Security concerns have rapidly moved up the software stack as the Internet and web have matured. The security, privacy, functionality, cost and usability tradeoffs necessary in any practical system can only be effectively achieved at the data and application layers.
This conference provides a dedicated venue for high-quality research in this arena and seeks to foster a community with this focus in cybersecurity.
The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers, and application domain experts.
Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security