ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WSS 2013 - World Security Summit 2013

Date2013-09-11 - 2013-09-13

Deadline2013-07-15

VenueSri Lanka, India India

Keywords

Websitehttps://asdf-wss.org

Topics/Call fo Papers

ASDF - WSS is the annual Worldwide Summit aimed at discussing current security research, threats, protocols and others relating to the Security. The idea of the Summit is for the Industrialists, Scientists, Scholars, Engineers and Students from the Universities all around the world and the industry to present and discuss the ongoing research activities, and hence to foster the security in all the applications. All the selected papers will be published into a single proceedings along with unique ISBN and indexed at various sources including ASDF Open Access Proceedings Portal, Google Scholar and others.
General security architecture for CR networks
(Inter)national applications of biometrics
(Inter)national policies on unique identifiers /social security numbers / personalisation IDs
(Possible) role of pseudonymous and anonymous identity in identity management
(Privacy preserving) identity profiling and fraud detection
Access control
Accountability
Anonymity and Privacy
Application security
Applications of anonymous credentials
Attack modeling, prevention, mitigation, and defense in CR systems, including primary user emulation attacks, authentication methods of primary users, spectrum sensing data falsification, spectrum misusage and selfish misbehaviors and unauthorized use of spectrum bands
Attacks and defenses
Attacks on identity management infrastructures
Attribute based authentication and access control
Auctions and Audits
Auditing in Cloud Computing
Authentication
Authentication and Identification
Automated development
Biometric verification
Biometrics
Business and security risk models
Censorship and censorship resistance
Certification and Authorization
Cloud Computing Security
Cloud Infrastructure Security
Cloudcentric security modeling and threats
Commercial Cryptographic Applications
Contactless Payment and Ticketing Systems
Copyright protection in the Cloud era
Crosslayer security design of CR networks
Cryptography in the Cloud era
Data Hiding and Recovery
Data Outsourcing Security
Defending against energy depletion attacks in resource constrained CR networks
Defending and mitigating jamming based DoS attacks in CR networks
Design for Forensic Evaluation
Digital Cash and Payment Systems
Digital forensic case studies
Digital forensic processes and workflow models
Digital Image Forensics
Digital Incentive and Loyalty Systems
Digital Rights Management
Distributed control systems/SCADA security
Distributed systems security
Electronic IDs: European and worldwide policies and cooperation in the field of identity management
Embedded device forensics
Embedded systems security
Emerging threats in Cloud-based services
Empirical secure software engineering
Event Reconstruction and Tracking
Federative identity management and deperimeterisation
File System Analysis
Forensics
Forensics Education, Training, & Standards
Forensics in Cloud environments
Forensics in Untrusted Environments
Fraud Detection
Game Theoretic Security
Geo-location for security in CR networks
Government PKIs
Hardware Assisted Forensics
Hardware security
Identification and authentication procedures
Identity management for mobile and ubiquitous computing
Identity management solutions for eHealth, eGovernmeant and eCommerce
Identity Theft
Identity theft prevention
Impact on society and politics
Impersonation, identity fraud, identity forge and identity theft
Implementation and testbed for security evaluation in CR systems
Incident Response and Live Data Analysis
Information Security
Infrastructure protection case studies
Infrastructure sector interdependencies and security implications
Interoperable identity management solutions
Intrusion detection
Intrusion detection systems in CR networks
Language based security
Legal and Regulatory Issues
Legal and regulatory issues in the Cloud era
Legal, economic and policy issues related to critical infrastructure protection
Legal, ethical and policy issues related to digital forensics
Legal, Ethical and Privacy Issues
Legal, socioeconomic, philosophical and ethical aspects
Malware
Methods for Attributing Malicious Cyber Activity
Methods for detecting, isolating and expelling misbehaving cognitive nodes
Methods of identification and authentication
Metrics
Microfinance and Micropayments
Model checking for security
Modeling and simulation of critical infrastructures
Multi-tenancy related security/privacy issues
Network and cloud forensics
Network Evidence Collection
Network Forensics
Network security
Novel identity management technologies and approaches
Operating System and Application Analysis
Performance evaluation for security solutions
Phishing and Social Engineering
Physical layer security for CR networks
Privacy and Identity (Management) in and for cloud computing
Privacy and Identity in social networks
Privacy enhancing Systems
Privacy enhancing technologies
Privacy in Cloud computing
Privacy management of identity management
Privacy preserving systems
Privacy protection in CR networks
Processes for the development of secure software and systems
Program rewriting techniques
Programming paradigms, models and DLS's for security
Proliferation/omnipresence of identification
Protocol security
Quality of identity data, processes and applications
Related developments in social tracking, tracing and sorting
Reputation Systems
Risk analysis and risk assessment methodologies
Risk analysis techniques for privacy risk and privacy impact assessment
Risk Assessment and Management
Risk Perceptions and Judgments
SCADA Forensics
scalable techniques for threat modeling and analysis of vulnerabilities
Secure Banking and Financial Web Services
Secure identity management mechanisms
Secure information flow
Secure information sharing
Secure job deployment and scheduling
Secure routing in multihop CR networks
Secure virtualization and resource allocation mechanisms
Securing distributed data storage in the Cloud
Securing Emerging Computational Paradigms
Security and Privacy in Automotive and Transport Systems and Applications
Security and privacy in big data management
Security and privacy in mobile Cloud
Security and Privacy in Mobile Devices and Applications
Security and Privacy in Social Networks
Security and Privacy in Sound and Secure Financial Systems Based on Social Networks
Security and privacy policies
Security and privacy requirements engineering in the Cloud
security architecture and design for software and systems
Security architectures
security assurance cases
Security challenges, solutions and implementation issues
Security Economics
Security for emerging Cloud programming models
Security in CR networks for the smart grid
Security issues for database based CR networks
Security management in the Cloud
Security measurement
Security modelling and threats in Cloud computing
Security oriented software reconfiguration and evolution
Security policies, standards and regulations for CR networks
Security testing
Smartcards, Secure Tokens and Secure Hardware
Spam
Specification and management of security requirements and policies
Specification formalisms for security artifacts
Support for assurance, certification and accreditation
Surveillance and monitoring
System security
Systematic support for security best practices
Telecommunications network security
Theories, techniques and tools for extracting, analyzing and preserving digital evidence
Threats to democracy and political control
Tracing, monitoring and forensics
Tradeoff between security and other nonfunctional requirements (in particular economic considerations)
Transactions and Contracts
Trust and policy management in the Cloud
Trust Management
Underground Market Economics
Usability and security
Usable Security
User authentication and access control in Cloudaware services
User centered, usable and inclusive identity management
User-centric identity management
Verification techniques for security properties
Virtual Economies
Visualization for Forensics
Voting Systems
Vulnerabilities in electronic identification protocols
Web security
Infrastructure vulnerabilities, threats and risks

Last modified: 2012-12-21 23:35:48