[PET] Call for Papers - 23rd ACM Conference on Computer and Communication Security (ACM CCS 2016)

Giovanni Livraga giovanni.livraga at unimi.it
Mon Apr 18 18:28:19 BST 2016


ACM CCS 2016 Call for Papers

23rd ACM Conference on Computer and Communication Security
October 24 - 28, 2016, Hofburg Palace, Vienna, Austria


Paper Submission Due:                May 23, 2016 23:59 UTC-11
First round reviews sent to authors: July 5, 2016
Author comments due on:              July 8, 2016 23:59 UTC-11
Acceptance Notification:             July 22, 2016
Camera Ready Papers Due:             August 16, 2016


The ACM CCS conference seeks submissions from academia, government, 
and industry presenting novel research results in all practical and 
theoretical aspects of computer and communications security. Papers 
should be related to the construction, evaluation, application, or 
operation of secure systems. Theoretical papers must make a convincing 
argument for the relevance of the results to secure systems. All topic 
areas related to computer and communications security are of interest 
and in scope. Accepted papers will be published by ACM Press in the 
conference proceedings.


Paper Submission Process
------------------------
Submissions must be made by the deadline of Monday, May 23, 2016 23:59 UTC-11. 
The review process will be carried out in two phases and authors will 
have an opportunity to comment on the first-phase reviews.

Submitted papers must not substantially overlap papers that have been 
published or that are simultaneously submitted to a journal, conference 
or workshop. Simultaneous submission of the same work is not allowed. 
Note that submitted papers cannot be withdrawn from the process after 
the first phase reviews are received by authors. Authors of accepted 
papers must guarantee that their papers will be presented at the 
conference.


Paper Format
------------
Submissions must be at most 12 pages in double-column ACM format 
(http://www.acm.org/sigs/publications/ proceedings-templates) including 
the bibliography and well-marked appendices. Submissions must be 
anonymized and avoid obvious self-references. Only PDF files will be 
accepted. Submissions not meeting these guidelines risk rejection without 
consideration of their merits.


Conflicts of Interest
---------------------
The program co-chairs require cooperation from both authors and program 
committee members to prevent submissions from being evaluated by reviewers 
who have a conflict of interest. During the submission process, we will 
ask authors to identify members of the program committee with whom they 
have a conflict of interest. This includes anyone with close personal 
or professional relationship to any of the authors, such as close family 
members, people from the same department/group, and recent collaborators 
(e.g. collaborated on a joint paper in the last two years). It also 
includes anyone in a position of substantial influence on (or by) the a
uthors, such as advisor or advisee (at any time in the past), line-of-management 
relationship, grant program manager, etc.

In rare cases, we will allow conflict-of-interest designation due to 
personal or professional animosity. In such cases, we require that in 
addition to marking the conflict during submission, the authors contact 
the program co-chairs by email and explain the reason for this conflict.

Program committee members who have a conflict of interest with a paper, 
including program co-chairs, will be excluded from evaluation and 
discussion of the paper. In the case of a program co-chair, the other 
co-chairs who do not have conflicts will be responsible for managing 
that paper.



More information about the PET mailing list