Sign up to receive email announcements and updates about conferences and future events
The 2009 International Conference on Security and Management (SAM'09) is held simultaneously
(ie, same location and dates: July 13-16, 2009, Las Vegas, USA) with a number of other
joint conferences as part of WORLDCOMP'09 (The 2009 World
Congress in Computer Science, Computer Engineering, and
Applied Computing). WORLDCOMP'09 is the largest annual
gathering of researchers in computer science, computer
engineering and applied computing. Many of the joint conferences in WORLDCOMP are the premier
conferences for presentation of advances in their respective
fields (for the complete list of joint conferences Click Here).
The motivation is to assemble a spectrum of affiliated
research conferences into a coordinated research meeting
held in a common place at a common time. The main goal
is to provide a forum for exchange of ideas in a number
of research areas that interact. The model used to form
these annual conferences facilitates communication among
researchers in different fields of computer science,
computer engineering and applied computing. Both inward
research (core areas of computer science and engineering)
and outward research (multi-disciplinary, Inter-disciplinary,
and applications) will be covered during the conferences.
The last set of conferences had
research contributions from 82 countries and had attracted over 2,000 participants. It is anticipated to have over 2,500 participants for
the 2009 event.
The event will be composed of research presentations, keynote lectures, invited presentations, tutorials, panel discussions, and
You are invited to submit a draft paper of about 5-7 pages and/or a proposal to
organize a Technical Session/workshop (see the Submission information).
All accepted papers will be published in the respective
conference proceedings. The names of technical session/workshop
organizers/chairs will appear on the cover of the
proceedings/books as Associate Editors.
Topics of interest include, but are not limited to,
Key management techniques
Security in e-Commerce and m-Commerce
Mobile network security
Hacking techniques and related issues
Security in CDN (Contents Distribution Networks)
Security for protocol management (SNMP, CMIP, etc)