-
-
[分享]CFP - Journal of Security and Communication Networks Special Issue
-
发表于: 2010-11-1 19:04 6519
-
[分享]CFP - Journal of Security and Communication Networks Special Issue
2010-11-1 19:04
6519
FW: CFP - Journal of Security and Communication Networks Special
Issue on Protecting the Internet of Things
----Original Message-----
> From: Mailing list for the scientific community interested in computer
> security [mailto:SECURITY@FOSAD.ORG] On Behalf Of Rodrigo Roman
> Sent: Friday, October 29, 2010 4:19 PM
> To: SECURITY@FOSAD.ORG
> Subject: CFP - Journal of Security and Communication Networks Special
> Issue on Protecting the Internet of Things
>
> [Apologies if you receive multiple copies of this message]
>
> Call for Papers: Protecting the Internet of Things
> in Journal of Security and Communication Networks (Wiley)
> http://www.interscience.wiley.com/journal/security
>
> Submission Due Dates:
> Manuscript due: 10th March 2011
> First Review Results: Late May/June 2011
> Final Acceptance Notification: August/September 2011
> Camera Ready Manuscript due: Late August/September 2011
> Publication: November/December 2011 (Tentative)
>
> The vision of the Internet of Things (IoT), supported by industrial
> companies
> and governments all over the world, marks an evolution that will surely
> have
> a great impact on our environments and our lives. The central element
> of this
> vision is the existence of a network of interconnected objects (from
> books to
> cars, from electrical appliances to food) that will be able not only to
> obtain information from their surroundings and interact with the
> physical
> world, but also to use existing Internet standards to provide services.
> However, security is extremely important for achieving this goal. As
> this
> worldwide network of interconnected objects can be exploited anywhere
> by
> anyone and anytime, it is necessary to enhance it with strong security
> foundations able to give birth to a world-changing paradigm. In fact,
> in
> order to adequately protect the IoT, there are plenty of factors that
> must be
> taken into account. For example, the protection of the different
> building
> blocks, the creation of interoperable security mechanisms, the
> development of
> new services that allow multiple entities (e.g., human beings,
> machines,
> objects) to cooperate with each other, and the management of all the
> information produced by those interactions. This special issue is
> proposed to
> cover research results and innovation case studies on security for the
> Internet of Things.
>
> Topics of interest include but are not limited to:
>
> * New security problems in the context of the IoT.
> * Privacy risks and data management problems.
> * Identifying, authenticating, and authorizing entities.
> * Development of trust frameworks for secure collaboration.
> * New cryptographic primitives for constrained "things".
> * Connecting heterogeneous ecosystems and technologies.
> * Legal Challenges and Governance Issues.
> * Resilience to external and internal attacks.
> * Context-Aware security.
> * Providing protection to an IP-connected IoT.
> * Web services security and other application-layer issues.
> * Distributed policy enforcement and rights management.
> * Usability of Security and Privacy Technologies in the context of the
> IoT.
>
> Submitted papers must represent high-quality and previously unpublished
> works. Original research papers are solicited in all areas on security
> for the Internet of Things. All submissions will be peer reviewed by at
> least three experts working in the areas. The guidelines for
> prospective
> authors can be found at
> http://www.interscience.wiley.com/journal/security).
> Prospective authors should submit their papers online at
> http://mc.manuscriptcentral.com/scn. When submitting the papers, the
> authors should make sure to choose the Manuscript type as 'Special
> Issue',
> and enter 'Running Head' and 'Special Issue title' as 'SCN-SI-029' and
> 'Internet of things', respectively.
>
> Guest Editors:
>
> Jim Clarke
> Waterford Institute of Technology, Ireland
> E-mail: jclarke@tssg.org
> Website: http://www.tssg.org/people/jclarke/
>
> Stefanos Gritzalis
> University of the Aegean, Greece
> E-mail: sgritz@aegean.gr
> Website: http://www.icsd.aegean.gr/sgritz/
>
> Rodrigo Roman
> University of Malaga, Spain
> E-mail: roman@lcc.uma.es
> Website: http://www.lcc.uma.es/~roman/
>
> Jianying Zhou
> Institute for Infocomm Research, Singapore
> E-mail: jyzhou@i2r.a-star.edu.sg
> Website: http://icsd.i2r.a-star.edu.sg/staff/jianying/
Issue on Protecting the Internet of Things
----Original Message-----
> From: Mailing list for the scientific community interested in computer
> security [mailto:SECURITY@FOSAD.ORG] On Behalf Of Rodrigo Roman
> Sent: Friday, October 29, 2010 4:19 PM
> To: SECURITY@FOSAD.ORG
> Subject: CFP - Journal of Security and Communication Networks Special
> Issue on Protecting the Internet of Things
>
> [Apologies if you receive multiple copies of this message]
>
> Call for Papers: Protecting the Internet of Things
> in Journal of Security and Communication Networks (Wiley)
> http://www.interscience.wiley.com/journal/security
>
> Submission Due Dates:
> Manuscript due: 10th March 2011
> First Review Results: Late May/June 2011
> Final Acceptance Notification: August/September 2011
> Camera Ready Manuscript due: Late August/September 2011
> Publication: November/December 2011 (Tentative)
>
> The vision of the Internet of Things (IoT), supported by industrial
> companies
> and governments all over the world, marks an evolution that will surely
> have
> a great impact on our environments and our lives. The central element
> of this
> vision is the existence of a network of interconnected objects (from
> books to
> cars, from electrical appliances to food) that will be able not only to
> obtain information from their surroundings and interact with the
> physical
> world, but also to use existing Internet standards to provide services.
> However, security is extremely important for achieving this goal. As
> this
> worldwide network of interconnected objects can be exploited anywhere
> by
> anyone and anytime, it is necessary to enhance it with strong security
> foundations able to give birth to a world-changing paradigm. In fact,
> in
> order to adequately protect the IoT, there are plenty of factors that
> must be
> taken into account. For example, the protection of the different
> building
> blocks, the creation of interoperable security mechanisms, the
> development of
> new services that allow multiple entities (e.g., human beings,
> machines,
> objects) to cooperate with each other, and the management of all the
> information produced by those interactions. This special issue is
> proposed to
> cover research results and innovation case studies on security for the
> Internet of Things.
>
> Topics of interest include but are not limited to:
>
> * New security problems in the context of the IoT.
> * Privacy risks and data management problems.
> * Identifying, authenticating, and authorizing entities.
> * Development of trust frameworks for secure collaboration.
> * New cryptographic primitives for constrained "things".
> * Connecting heterogeneous ecosystems and technologies.
> * Legal Challenges and Governance Issues.
> * Resilience to external and internal attacks.
> * Context-Aware security.
> * Providing protection to an IP-connected IoT.
> * Web services security and other application-layer issues.
> * Distributed policy enforcement and rights management.
> * Usability of Security and Privacy Technologies in the context of the
> IoT.
>
> Submitted papers must represent high-quality and previously unpublished
> works. Original research papers are solicited in all areas on security
> for the Internet of Things. All submissions will be peer reviewed by at
> least three experts working in the areas. The guidelines for
> prospective
> authors can be found at
> http://www.interscience.wiley.com/journal/security).
> Prospective authors should submit their papers online at
> http://mc.manuscriptcentral.com/scn. When submitting the papers, the
> authors should make sure to choose the Manuscript type as 'Special
> Issue',
> and enter 'Running Head' and 'Special Issue title' as 'SCN-SI-029' and
> 'Internet of things', respectively.
>
> Guest Editors:
>
> Jim Clarke
> Waterford Institute of Technology, Ireland
> E-mail: jclarke@tssg.org
> Website: http://www.tssg.org/people/jclarke/
>
> Stefanos Gritzalis
> University of the Aegean, Greece
> E-mail: sgritz@aegean.gr
> Website: http://www.icsd.aegean.gr/sgritz/
>
> Rodrigo Roman
> University of Malaga, Spain
> E-mail: roman@lcc.uma.es
> Website: http://www.lcc.uma.es/~roman/
>
> Jianying Zhou
> Institute for Infocomm Research, Singapore
> E-mail: jyzhou@i2r.a-star.edu.sg
> Website: http://icsd.i2r.a-star.edu.sg/staff/jianying/
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
他的文章
- [转帖][Cado-nfs-discuss] 795-bit factoring and discrete logarithms (RSA-240 于2019年12月2日被破解) 19498
- [转帖]How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits 8162
- [推荐]RSA-220 has 220 decimal digits (729 bits), and was factored 6895
- [推荐]RSA-210 has been factored. 11179
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks... 8923
看原图
赞赏
雪币:
留言: