SecIoT 2012 - 2012 International Workshop on the Security of the Internet of Things (SecIoT)
Topics/Call fo Papers
The Internet of Things is slowly becoming a reality, and its ultimate vision - a world-wide network of interconnected objects that provide and consume services - seems within reach. However, this young, emergent Internet of Things needs to be carefully protected. Major problems must be detected, protocols must be developed, fault tolerance must be achieved. SecIoT'12, held in conjunction with the ICCCN 2012 Conference, wants to bring together researchers and professionals from universities, private companies and public administrations interested or involved in all security-related heterogeneous aspects of the Internet of Things.
http://www.nics.uma.es/seciot12/contact.html
We invite research papers, work-in-progress reports, R&D projects results, surveying works and industrial experiences describing significant security advances in the following (non-exclusive) areas of the Internet of Things:
New security problems in the context of the IoT.
Privacy risks and data management problems.
Identifying, authenticating, and authorizing entities.
Development of trust frameworks for secure collaboration.
New cryptographic primitives for constrained "things".
Connecting heterogeneous ecosystems and technologies.
Legal challenges and governance Issues.
Resilience to external and internal attacks.
Context-Aware security.
Providing protection to an IP-connected IoT.
Web services security and other application-layer issues.
Security of cloud-based M2M/IoT platforms.
Distributed policy enforcement and rights management.
Usability of security and privacy technologies in the IoT.
http://www.nics.uma.es/seciot12/contact.html
We invite research papers, work-in-progress reports, R&D projects results, surveying works and industrial experiences describing significant security advances in the following (non-exclusive) areas of the Internet of Things:
New security problems in the context of the IoT.
Privacy risks and data management problems.
Identifying, authenticating, and authorizing entities.
Development of trust frameworks for secure collaboration.
New cryptographic primitives for constrained "things".
Connecting heterogeneous ecosystems and technologies.
Legal challenges and governance Issues.
Resilience to external and internal attacks.
Context-Aware security.
Providing protection to an IP-connected IoT.
Web services security and other application-layer issues.
Security of cloud-based M2M/IoT platforms.
Distributed policy enforcement and rights management.
Usability of security and privacy technologies in the IoT.
Other CFPs
- Mobile Ad Hoc Networks for Public Safety Systems; Techniques and Challenges in On-Going Work
- Wireless Sensor, Actuator and Robot Networks
- The 2012 International Workshop on Advanced Image Technology
- 7th International Workshop on Wireless and Sensor Networks Security
- MeshTech 2011 Fifth IEEE International Workshop on Enabling Technologies and Standards for Wireless Mesh Networking
Last modified: 2011-12-23 23:44:05