ACISP |
Australasian Conference on Information Security and Privacy |
ACM RBAC |
ACM Workshop on Role-Based Access Control |
ACSAC |
Annual Computer Security Applications Conference |
COMPASS |
Annual Conference on Computer Assurance |
CSFW |
IEEE Computer Security Foundations Workshop |
DSOM |
IFIP WG11.3 /IEEE International Workshop on Distributed
Systems |
ESORICS |
European Symposium on Research in Security and Privacy |
IASTED-CSE |
International Association of Science and Technology for
Development Conference on Software Engineering |
IFIP WG11.3 |
IFIP WG11.3 Workshop on Database Security |
INFOSECU |
International Conference on Information Security |
IWDI |
Invitational Workshop on Data Integrity |
MMM-ACNS |
International Workshop on Mathematical
Methods, Models and Architectures for Computer Networks Security |
NCSC |
NIST-NCSC National Computer Security Conference |
NISSC |
National Information Systems Security Conference |
NSP |
ACM SIGSAC New Security Paradigms Workshops |
OAKLAND |
IEEE Symposium on Research in Security and Privacy |
OOPSLA |
Conference Workshop on Security for Object-Oriented Systems |
PARCOM |
Conference on Parallel Computing |
POLICY |
International Workshop on Policies for Distributed Systems
and Networks |
RADC |
RADC Workshop on Multilevel Database Security |
RSA-CT |
RSA Security Conference Cryptographers' Track |
SACMAT |
ACM Symposium on Access Control Models and Technologies |
SIGMOD |
ACM SIGMOD International Conference on Management of Data |
SAC |
ACM Symposium on Applied Computing |