Loading...
Please wait, while we are loading the content...
Similar Documents
Program Twenty-Second Annual Computer Security Applications Conference ( ACSAC ) Practical Solutions
| Content Provider | Semantic Scholar |
|---|---|
| Abstract | My job as conference chair has allowed me to work with an extremely talented group of people committed to bring you the best possible security conference. I sincerely wish to thank them for all their hard work over the course of the year. The ACSAC team has constantly strived to improve the conference. This year we have added a new " behind the scenes " feature of an ACSAC steering committee. The goal of the steering committee is to look at the long-term direction the ACSAC conference needs to go in the changing computer security landscape. The steering committee is made up of past program and conference chairs and other individuals dedicated to the ACSAC mission of providing a solid venue to educate new security practitioners and a forum for discussion new security technology. The ACSAC conference emphasizes practical solutions to real world security problems. Since the real world keeps changing, ACSAC must keep changing as well. Many thanks to the steering committee for bringing their new ideas to ACSAC this year. As conference chair, I would like to also thank you, the attendees, for choosing ACSAC as the venue to share your ideas and to learn. Never hesitate to send us your ideas and comments. This year we have an on-line survey at http://www.acsac.org/survey. Fill in the survey before January 3, 2007 and register for a chance to win an iPod Shuffle. Meeting Locations All meeting locations are indicated in parentheses throughout the program. For the technical tracks on Tuesday through Thursday, the Mediterranean East room, which is the largest room, will host Track 2 and our Combined/Plenary sessions, while the Mediterranean Center room will host Track 1 and the Mediterranean West room will host Track 3. Breakfasts, lunches and breaks will be served in the Regency Ballroom. The Desk also serves as the conference " Lost and Found Center " and is the location of the conference message board. Session Etiquette Please be courteous of others around you during the Tutorial and Conference sessions. Try to enter and exit the session quietly. Please mute any beepers, cellular telephones, or similar devices, and please follow the directions of the session chair for asking questions. Thank you for your cooperation! 4 ACSAC 2006 Invited Speakers Invited Speakers Distinguished Practitioner Dr. Dixie B. Baker is a Technical Fellow and Vice President for Technology at Science Applications International Corporation (SAIC), where she … |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://www.acsac.org/2006/final-program.pdf |
| Alternate Webpage(s) | http://www.acsac.org/2003/adv_pgm.pdf |
| Alternate Webpage(s) | http://xml.coverpages.org/ACSA-2003.pdf |
| Alternate Webpage(s) | http://www.acsac.org/2006/final-program.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |