Información de la conferencia
CODASPY 2025: ACM Conference on Data and Application Security and Privacy
https://www.codaspy.org/2025/index.htmlDía de Entrega: |
2024-12-01 |
Fecha de Notificación: |
2025-01-24 |
Fecha de Conferencia: |
2025-06-04 |
Ubicación: |
Pittsburgh, Pennsylvania, USA |
Años: |
15 |
QUALIS: b4 Vistas: 31541 Seguidores: 32 Asistentes: 1
Solicitud de Artículos
CODASPY 2025 is the 15th ACM Conference on Data and Application Security and Privacy. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. The goal of the ACM Conference on Data and Applications Security (CODASPY) is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to: Application-layer security policies Access control for applications Access control for databases Artificial intelligence for security Data-dissemination controls Data forensics Data leak detection and prevention Enforcement-layer security policies Machine learning for security Privacy-preserving techniques Private information retrieval Search on protected/encrypted data Secure auditing Secure collaboration Secure data provenance Secure electronic commerce Secure information sharing Secure knowledge management Secure multiparty computation Secure software development Securing data/apps on untrusted platforms Securing the semantic web Security and privacy in GIS/spatial data Security and privacy in healthcare Security and privacy in the Internet of Things Security policies for databases Social computing security and privacy Social networking security and privacy Trust metrics for applications, data, and users Trustworthy artificial intelligence / machine learning Usable security and privacy Web application security CODASPY 2025 will also feature a dataset and tool paper track, which will provide a unique venue for researchers and practitioners to make available and citable their work done to achieve datasets or tools relevant in the security and privacy domain. Papers accepted in this track have to describe the available datasets or reporting on the design and implementation of application security and privacy tools. Dataset/tool papers are limited to 6 pages.
Última Actualización Por Dou Sun en 2024-10-01
Los Mejores Artículos
Año | Los Mejores Artículos |
---|---|
2016 | Differentially Private K-Means Clustering |
Ir a página:
Conferencias Relacionadas
Abreviación | Nombre Completo | Entrega | Conferencia |
---|---|---|---|
ASWEC | Australian Software Engineering Conference | 2013-10-28 | 2014-04-07 |
ICIHT | International Conference on Informatics, Health & Technology | 2016-10-03 | 2017-02-21 |
PODC | ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing | 2025-02-07 | 2025-06-16 |
ICICN' | International Conference on Information, Communication and Networks | 2024-04-25 | 2024-08-21 |
IMSM | International Conference on Industrial Manufacturing and Structural Materials | 2024-01-19 | 2024-03-15 |
WUWNet | ACM International Conference on Underwater Networks & Systems | 2023-08-15 | 2023-11-24 |
ISAIMS | International Symposium on Artificial Intelligence in Medical Sciences | 2020-09-06 | 2020-09-11 |
PacificVis | IEEE Pacific Visualization Symposium | 2024-11-13 | 2025-04-22 |
BDC | IEEE/ACM International Symposium on Big Data Computing | 2015-07-03 | 2015-12-07 |
MMSP | International Workshop on Multimedia Signal Processing | 2024-06-19 | 2024-10-02 |
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
Cryptography | MDPI | 2410-387X | ||
Telematics and Informatics | 7.600 | Elsevier | 0736-5853 | |
Journal of Pathology Informatics | Elsevier | 2229-5089 | ||
b | Theoretical Computer Science | 0.900 | Elsevier | 0304-3975 |
International Journal on Cryptography and Information Security | AIRCC | 1839-8626 | ||
International Journal of Data Mining, Modelling and Management | Inderscience | 1759-1163 | ||
IET Control Theory & Applications | 2.200 | IET | 1751-8644 | |
a | IEEE/ACM Transactions on Networking | 3.000 | IEEE/ACM | 1063-6692 |
c | Personal and Ubiquitous Computing | Springer | 1617-4909 | |
Mechanical Systems and Signal Processing | 7.900 | Elsevier | 0888-3270 |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
Cryptography | MDPI | |
Telematics and Informatics | 7.600 | Elsevier |
Journal of Pathology Informatics | Elsevier | |
Theoretical Computer Science | 0.900 | Elsevier |
International Journal on Cryptography and Information Security | AIRCC | |
International Journal of Data Mining, Modelling and Management | Inderscience | |
IET Control Theory & Applications | 2.200 | IET |
IEEE/ACM Transactions on Networking | 3.000 | IEEE/ACM |
Personal and Ubiquitous Computing | Springer | |
Mechanical Systems and Signal Processing | 7.900 | Elsevier |
Recomendaciones