1st Conference on Advances in Computer Security and Forensics (ACSF) To be held at the School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK http://www.cms.livjm.ac.uk/acsf1/ 13-14 July, 2006 Call for Papers The 1st conference on Advances in Computer Security and Forensics (ACSF) will take place at Liverpool John Moores University in July 2006. The conference will draw a wide-range of participants from the national and international research community as well as current practitioners within the fields of computer security and computer forensics. Computer security aims to preserve system integrity whilst computer forensics aims to explain the cause for an event or set of events. Computer security is an established field of computer science, whilst forensic computing is an emergent area. Increasingly, computer security will involve forensic investigation techniques, and vice versa, due to the degree of overlap in raw material used by both fields. Therefore, both fields have much to learn from each other. The purpose of this conference is to bring together researchers and practitioners to present and share the latest developments in research and applications in both these fields. This conference brings together academics, IT managers, system administrators, security specialists, forensic practitioners, and anyone interested in * the most advanced research in computer security and computer forensics * the latest developments in computer security and computer forensics applications * sharing views and experiences between academia and practitioners. The conference will be organised into a number of tracks for both academia and industry, which include refereed paper presentations, panel discussions and invited talks based on the submissions received and the interests expressed. The topics below are for guidance only and not as an exhaustive list: * Intrusion Detection Systems * Wireless and ad hoc network security * Mobile agents for secure systems * Web security * Vulnerabilities and attacks * Distributed Denial-of-Service attack countermeasures * Network Security * Viruses and hostile code * Secure systems and network administration * Database security * Cryptography * Trust management * Privacy and anonymity * Digital Rights Management (DRM) and intellectual property * Access control, auditing and accountability * Incident Response and Management * Legal issues in computer forensics * Mobile device forensics * Collecting evidence * Network forensics * Practitioner case studies Paper Submission Authors are hereby invited to submit original papers in Word or PDF format. All papers must be in English and the length should not exceed 10 pages typeset in LNCS format. All paper submissions will be handled electronically. Authors should e-mail a version of their paper to the conference chair. Papers will be evaluated based on their quality and relevance. Each paper will be reviewed by independent reviewers, whose reviews will be relayed to the corresponding author. All submissions are held in confidentiality prior to publication in the proceedings. Panel proposals should provide the scope of the panel and panel members. Panel proposals will be evaluated by the program committee. Accepted papers will be presented by their authors and will be published in the conference proceedings. Important Dates Paper and panel submission: 1 May, 2006 Notification of acceptance: 1 June, 2006 Final version of the paper due: 15 June, 2006 Conference Chair Dr John Haggerty, Liverpool John Moores University. J.Haggerty@ljmu.ac.uk Prof Madjid Merabti, Liverpool John Moores University. M.Merabti@ljmu.ac.uk