ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WNS 2013 - The 8th Workshop on Network Security (WNS 2013)

Date2013-10-21 - 2013-10-24

Deadline2013-05-12

VenueSydney, Australia Australia

Keywords

Websitehttp://www.ieeelcn.org

Topics/Call fo Papers

The proliferation of commercial and non-commercial activities over different networked systems has brought security concerns on an unprecedented scale. Every new network technology brings along another wave of attacks exploiting new ways to comprise the confidentiality, integrity, authenticity, or availability of services and data. To protect these network assets, communication endpoints as well as every layer of the communication stack needs to be secured. Current trends from stationary to mobile devices, local to cloud storage, native to web apps, centralized to distributed processing, pre-configured to ad hoc set up, narrowband to broadband, homogenous to heterogeneous networks, special-purpose to consumer devices and closed to open platforms force us to re-design and sometimes completely rethink existing security mechanisms. At the same time novel security solutions must meet the special needs and constraints of these new communication technologies.
The main purpose of this workshop is to promote further research interests and activities on Network Security. This workshop aims to increase the synergy between academic and industrial researchers working in this area. We are interested in experimental, systems-related, and work-in-progress papers in all aspects of Network Security.
The topics of interest include, but are not limited to:
? Novel and emerging security architectures
? Security in emerging network technologies, including ad hoc, sensor, mesh, overlay, cross-layer, vehicular, body area, cloud, P2P, LTE, RFID, NFC and smart grid networks
? Key management
? Identity management
? Trust management
? Secure cross domain roaming
? Secure data accumulation, storage and access control
? Tradeoffs between security, performance and usability
? Study of attack strategies, attack modeling
? Case studies and analysis of actual attacks
? Intrusion Detection and Response
Submission:
Authors are invited to submit full papers for presentation at the workshop. Papers (no more than 8 camera-ready pages, in IEEE TRANSACTION format) should describe original, previously unpublished work, not currently under review by another conference, workshop, or journal. All accepted papers will appear in the IEEE LCN conference proceedings. All paper submissions will be handled electronically in EDAS.
Please direct all questions to the workshop chairs: wns2013-chairs-AT-edas.info

Last modified: 2013-03-04 22:01:00