ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SETOP 2013 - 6th SETOP International Workshop on Autonomous and Spontaneous Security

Date2013-09-12 - 2013-09-13

Deadline2013-03-31

VenueEgham, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttp://conferences.telecom-bretagne.eu/setop2013/

Topics/Call fo Papers

The workshop will be held in Egham U.K. at Royal Holloway, University of
London, in conjunction with the 18th annual European research event in Computer
Security (ESORICS 2013) symposium. The workshop is structured in two tracks: a
research track and an industrial track.
Scope: Security and reliability have become a major concern for service-oriented
applications as well as for communications systems and networks. Prospective authors
are encouraged to submit papers addressing the automated configuration of security
policies in the context of dynamic, heterogeneous and mobile environments.
Aiming at secure and interoperable networks and systems, major challenges related to
policy conflict detection and resolution must be addressed. Papers related to
autonomous assessment and intrusion mitigation are particularly invited for
submission.
Topics: The SETOP Workshop seeks submissions that present research results on all
aspects related to spontaneous and autonomous security. Submissions by PhD students
are encouraged. Topics of interest include, but are not limited to the following:
Security policy deployment
Self evaluation of risk and impact
Distributed intrusion detection
Autonomous and spontaneous response
Trust establishment & lightweight cryptography
Selfish behavior and collaboration enforcement
Security in autonomous ad hoc networks
Security in sensor&RFID networks
Security of Next Generation Networks
Security in Cloud Computing
Security of Service Oriented Architectures
Security of opportunistic networks
Privacy in self-organized networks
Secure localization& context aware ubiquitous computing
Secure interoperability and negotiation
Self-organization in secure routing
Identity management, modeling and validation of security

Last modified: 2013-01-22 22:46:12