TWC 2012 - TWC-2012 THIRD INTERNATIONAL WORKSHOP ON TRUSTWORTHY COMPUTING
Topics/Call fo Papers
Computers reside at the heart of systems on which people now rely, both in critical national infrastructures and in their homes, cars, and offices. Today, many of these systems are far too vulnerable to cyber attacks that can inhibit their operation, corrupt valuable data, or expose private information. Future systems will include sensors and computers everywhere, exacerbating the attainment of security and privacy. Current security practices largely address current and known threats, but there is a need for research to take account of future threats.
We encourage contributions describing innovative work on TwC. The topics of interest include but are not limited to:
Security of next generation Operating Systems
Secure and resilient network protocols
Theoretical foundations and mechanisms for privacy, security, trust
Human computer interface for security functions
Vulnerabilities of existing protocols and applications
Key distribution/management
Intrusion detection and response
Secure protocol configuration and deployment
Improved ability to certify system security properties
Improved ability to analyze security designs, build systems correctly
More effective system monitoring, anomaly detection, attack recognition and defense
Integrating hardware and software for security
For further information, please contact the workshop co-chairs.
We encourage contributions describing innovative work on TwC. The topics of interest include but are not limited to:
Security of next generation Operating Systems
Secure and resilient network protocols
Theoretical foundations and mechanisms for privacy, security, trust
Human computer interface for security functions
Vulnerabilities of existing protocols and applications
Key distribution/management
Intrusion detection and response
Secure protocol configuration and deployment
Improved ability to certify system security properties
Improved ability to analyze security designs, build systems correctly
More effective system monitoring, anomaly detection, attack recognition and defense
Integrating hardware and software for security
For further information, please contact the workshop co-chairs.
Other CFPs
- The 3rd International Symposium on Frontiers in Ubiquitous Computing, Networking and Applications (NeoFusion 2012)
- The First International Workshop on Cyber-Physical Systems, Applications and Technologies (CPS-AT)
- International Workshop on Network-based Virtual Reality and Tele-existence (INVITE'2012)
- The 1st International Workshop on Renewable Computing Systems (WReCS-2012)
- First International Workshop on Algorithms and Concepts for Networked Sensing Systems Powered by Energy Harvesters EnHaNSS 2012
Last modified: 2012-02-15 16:35:15