setop 2011 - 4th SETOP International Workshop on Autonomous and Spontaneous Security
Topics/Call fo Papers
Security and reliability have become a major concern for service oriented applications as well as for communications systems and networks. With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this context, security is an essential property. It must be thought at the early stage of conception of these systems and designed to be also autonomous and spontaneous.
Future networks and systems must be able to automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. Those networks and systems should interoperate securely when their respective security policies are heterogeneous and possibly conflicting. They must be able to autonomously evaluate the impact of an intrusion in order to spontaneously select the appropriate and relevant response when a given intrusion is detected. Autonomous and spontaneous security is a major requirement of future networks and systems. Of course, it is crucial to address this issue in different wireless and mobile technologies available today such as RFID, Wifi, Wimax, 3G, etc. Other technologies such as ad hoc and sensor networks, which introduce new type of services, also share similar requirements for an autonomous and spontaneous management of security.
Topics
The SETOP Workshop seeks submissions that present research results on all aspects related to spontaneous and autonomous security. Submissions by PhD students are encouraged. Topics of interest include, but are not limited to the following:
http://setop2011.dyndns.org/cfp.html
Security policy deployment
Self evaluation of risk and impact
Distributed intrusion detection
Autonomous and spontaneous response
Trust establishment
Lightweight cryptography
Selfish behaviour and collaboration enforcement
Security in autonomous networks
Security in ad hoc networks
Security in sensor/RFID networks
Security of Next Generation Networks
Security in Cloud Computing
Security of Service Oriented Architecture
Security of opportunistic networks
Privacy in self-organized networks
Secure localization
Context aware and ubiquitous computing
Secure interoperability and negotiation
Self-organization in secure routing
Identity management
Modelling and validation of security
Submission guidelines
Papers should be at most 15 pages (using 11-point font), excluding the bibliography and well-marked appendices. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English.
Authors must submit their papers by the deadline indicated below, using the EasyChair web site and following the requirements stated there.
All papers will be refereed. Accepted papers should be presented at the Workshop. At least one author of each accepted paper must register to the workshop, by the early date indicated by the organizers, and present the paper.
Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged.
Future networks and systems must be able to automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. Those networks and systems should interoperate securely when their respective security policies are heterogeneous and possibly conflicting. They must be able to autonomously evaluate the impact of an intrusion in order to spontaneously select the appropriate and relevant response when a given intrusion is detected. Autonomous and spontaneous security is a major requirement of future networks and systems. Of course, it is crucial to address this issue in different wireless and mobile technologies available today such as RFID, Wifi, Wimax, 3G, etc. Other technologies such as ad hoc and sensor networks, which introduce new type of services, also share similar requirements for an autonomous and spontaneous management of security.
Topics
The SETOP Workshop seeks submissions that present research results on all aspects related to spontaneous and autonomous security. Submissions by PhD students are encouraged. Topics of interest include, but are not limited to the following:
http://setop2011.dyndns.org/cfp.html
Security policy deployment
Self evaluation of risk and impact
Distributed intrusion detection
Autonomous and spontaneous response
Trust establishment
Lightweight cryptography
Selfish behaviour and collaboration enforcement
Security in autonomous networks
Security in ad hoc networks
Security in sensor/RFID networks
Security of Next Generation Networks
Security in Cloud Computing
Security of Service Oriented Architecture
Security of opportunistic networks
Privacy in self-organized networks
Secure localization
Context aware and ubiquitous computing
Secure interoperability and negotiation
Self-organization in secure routing
Identity management
Modelling and validation of security
Submission guidelines
Papers should be at most 15 pages (using 11-point font), excluding the bibliography and well-marked appendices. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English.
Authors must submit their papers by the deadline indicated below, using the EasyChair web site and following the requirements stated there.
All papers will be refereed. Accepted papers should be presented at the Workshop. At least one author of each accepted paper must register to the workshop, by the early date indicated by the organizers, and present the paper.
Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged.
Other CFPs
Last modified: 2011-04-05 15:10:25