- Sponsor:
- sigsac
These proceedings contain the papers selected for presentation at the 15th ACM Conference on Computer and Communications Security (CCS 2008), held October 27 to October 31, 2008 in Alexandria, VA, USA.
In response to the call for papers 280 papers were submitted to the conference. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least four members of the program committee. Reviewing was double-blind, meaning that the program committee was not able to see the names and affiliations of the authors, and the authors were not told which committee members reviewed which papers. After the reviews were written, the program committee met online for three weeks of intensive discussion. Of the papers submitted, 51 were selected for presentation at the conference, yielding in an acceptance rate of about 18%.
Cited By
-
De Capitani di Vimercati S, Foresti S, Livraga G, Samarati P, Agaian S, DelMarco S and Asari V (2019). Data security and privacy in the cloud Mobile Multimedia/Image Processing, Security, and Applications 2019, 10.1117/12.2523603, 9781510626515, (15)
-
Lei Y, Hu M, Gong B, Wang L and Cheng Y (2019). A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet Security and Privacy in New Computing Environments, 10.1007/978-3-030-21373-2_42, (521-537),
-
Ternovskiy I, Chin P, Camilo A, Grégio A and Santos R (2016). Identifying compromised systems through correlation of suspicious traffic from malware behavioral analysis SPIE Defense + Security, 10.1117/12.2223968, , (982606), Online publication date: 12-May-2016.
-
Sarala R, Vijayalakshmi V, Zayaraz G and Priyanka E (2014). Risk intelligence retrieval based on ontology 2014 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 10.1109/ICCIC.2014.7238338, 978-1-4799-3974-9, (1-4)
Index Terms
- Proceedings of the 15th ACM conference on Computer and communications security