FIST 2011 - FIST 2011 Second International Workshop on Security & Trust in the Future Internet
Topics/Call fo Papers
In the last few years, considerable efforts have been devoted to enhancing the current Internet with abilities to provide security, identity, privacy, and trust. In any Future Internet (FI) design, security and trust considerations must fit to the other major emerging trends, notably handling generalized mobility and scalability with ever increasing abstractions, redirections, virtualization but also growing numbers of users, devices and services; and reliably delivering time-critical and mission-critical applications. Besides, new problem areas are adumbrated by the striking differences of the legal systems of the respective participating states on the one side and the hegemony of a few Internet technologies on the other.
Today’s communications systems are often semi-open or open environments, where not all actors are known in advance. Besides, we believe that in the future, the communication landscape will tend to multi-tenant exchanges (e.g. Cloud Computing, new services, etc), with an increasing trend to obscurity in the implementation and involving principals of different ethical and cultural backgrounds. This situation poses major challenges in the traditional security thinking.
Acknowledging these challenges, the Second Future Internet Security and Trust Workshop calls for new ideas treating trust and security instrumentations as principally independent blocks. In the area of Future Internet trust, we call for original contributions regarding both local and distributed trust establishment, nourishing and evaluation; trust instrumentation as a necessary decision component in the overall system architecture; and architectural solutions to enable coexistence of different trust and security models within the same system. Further, in the area of Future Internet security, the workshop calls for original contributions specifically encouraging solutions complementing the classical protection methods by novel alternative operational security models such as monitor-and-react, deterrence, survivability and disinformation.
To discuss the pros and cons of different proposals, in addition to the regular paper presentation sessions, a panel will be held to recapitulate the key issues, research challenges, and potential research collaborations.
ICNP 2011 Future Internet Security and Trust Workshop will address several aspects of making the Future Internet more trustworthy for its users. Yet, unlike traditional methods, here the definition of trustworthiness is per transaction and user and, therefore, cannot be based on preliminarily designed security and reliability of the system alone. On the one hand, the classical mechanisms need to evolve, and on the other, the users need to increasingly rely on other means for evaluating the trustworthiness of specific work flows at any given place, time and protocol instant.
Topic of Interests
1. Beyond protection: new operational security models for FI
?How to implement effective deterrence? FI traceability and non-repudiation, witness architectures, time- and geo-stamping
?Definitions and implementations of survivable systems: preservation of critical services, adaptations, effective control in presence of attacks and failures
?Using disinformation for FI security: lies and half-truths in an open world, pseudos and temporal identifiers, deflection, chameleons in security mechanisms
?Reacting to detected attacks and failures: from dedicated local countermeasures over partner alert and help demand systems to counterstrikes
2.Grasping the uncertainty: interactions in an open, multi-polar environment
?Trust architecture in the FI: systems and mechanisms to trust establishment, nourishing and breaching and their application in the FI context; identification and recognition of principals; trust evaluation systems and protocols.
?Trust models: trust indicators, development of trust in time, space, protocols in the Future Internet
?Trust-based decisions in the FI framework: postponing or not-engaging, dynamic choices of partnering systems, scenarios, applications
3. Security and trust interworking: reconciling open APIs and obscure implementations
?Certification ? assurance as a trust basis: how good is the security of a potential partner? What is the current internal processing chain? How good is my own security?
?Tailored security for assets of a given criticality: adapting security levels in interactions depending on perceived/calculated momentary
http://perso.telecom-paristech.fr/~hecker/FIST2011...
Today’s communications systems are often semi-open or open environments, where not all actors are known in advance. Besides, we believe that in the future, the communication landscape will tend to multi-tenant exchanges (e.g. Cloud Computing, new services, etc), with an increasing trend to obscurity in the implementation and involving principals of different ethical and cultural backgrounds. This situation poses major challenges in the traditional security thinking.
Acknowledging these challenges, the Second Future Internet Security and Trust Workshop calls for new ideas treating trust and security instrumentations as principally independent blocks. In the area of Future Internet trust, we call for original contributions regarding both local and distributed trust establishment, nourishing and evaluation; trust instrumentation as a necessary decision component in the overall system architecture; and architectural solutions to enable coexistence of different trust and security models within the same system. Further, in the area of Future Internet security, the workshop calls for original contributions specifically encouraging solutions complementing the classical protection methods by novel alternative operational security models such as monitor-and-react, deterrence, survivability and disinformation.
To discuss the pros and cons of different proposals, in addition to the regular paper presentation sessions, a panel will be held to recapitulate the key issues, research challenges, and potential research collaborations.
ICNP 2011 Future Internet Security and Trust Workshop will address several aspects of making the Future Internet more trustworthy for its users. Yet, unlike traditional methods, here the definition of trustworthiness is per transaction and user and, therefore, cannot be based on preliminarily designed security and reliability of the system alone. On the one hand, the classical mechanisms need to evolve, and on the other, the users need to increasingly rely on other means for evaluating the trustworthiness of specific work flows at any given place, time and protocol instant.
Topic of Interests
1. Beyond protection: new operational security models for FI
?How to implement effective deterrence? FI traceability and non-repudiation, witness architectures, time- and geo-stamping
?Definitions and implementations of survivable systems: preservation of critical services, adaptations, effective control in presence of attacks and failures
?Using disinformation for FI security: lies and half-truths in an open world, pseudos and temporal identifiers, deflection, chameleons in security mechanisms
?Reacting to detected attacks and failures: from dedicated local countermeasures over partner alert and help demand systems to counterstrikes
2.Grasping the uncertainty: interactions in an open, multi-polar environment
?Trust architecture in the FI: systems and mechanisms to trust establishment, nourishing and breaching and their application in the FI context; identification and recognition of principals; trust evaluation systems and protocols.
?Trust models: trust indicators, development of trust in time, space, protocols in the Future Internet
?Trust-based decisions in the FI framework: postponing or not-engaging, dynamic choices of partnering systems, scenarios, applications
3. Security and trust interworking: reconciling open APIs and obscure implementations
?Certification ? assurance as a trust basis: how good is the security of a potential partner? What is the current internal processing chain? How good is my own security?
?Tailored security for assets of a given criticality: adapting security levels in interactions depending on perceived/calculated momentary
http://perso.telecom-paristech.fr/~hecker/FIST2011...
Other CFPs
- 2011 1st International Workshop on Rigorous Protocol Engineering (WRiPE)
- 2011 Brazilian Power Electronics Conference (COBEP 2011)
- 2012 12th International Workshop on Variable Structure Systems (VSS 2012)
- The IEEE International Conference on Biomedical Computing (BioMedCom-2012)
- Second conference on the Analysis of Mobile Phone Datasets and Networks
Last modified: 2011-06-25 10:25:20