ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

T(CI) 2013 - T(CI)2: Trusted Computing for Critical Information Infrastructures

Date2013-07-10 - 2013-07-12

Deadline2013-03-31

VenuePiraeus, Greece Greece

Keywords

Websitehttps://iisa2013.unipi.gr

Topics/Call fo Papers

Critical Information Infrastructures (CIIs) are complex systems including both cyber (control) and physical (operational) components. The proper control, connectivity and interoperability of CIIs are vital for the normal operation, safety and security of major facilities and services such as energy, water provision, ICT, financial services and transportation.
However, the need for remote access and control, the provision of e/m-services that are accessible through the Internet and the dependencies between CIIs exposes them to various threats, while their distributed nature makes them subject to hardware, software and human-behavior vulnerabilities. Possible cyber attacks against CIIs may lead to severe impact due to service unavailability (e.g. via DoS and DDoS attacks), unauthorized access and data exposure and/or modification (e.g. via worms, viruses and drive-by exploits) or unauthorized administration (e.g. via hidden Command & Control channels, botnets and rootkits).
Our goal is to bring together academic and industrial researchers, designers, and service providers focusing on Critical Information Infrastructure Protection during normal or emergency operation modes. Emphasis will be given to cyber security technologies, architectures, controls and policies that create a Trusted Computing Environment, in order to provide trustworthy and reliable Critical Information Infrastructures.
Topics of interest include but are not limited to:
Critical Information Infrastructure Protection (CIIP), including energy, ICT and transportation
Cyber-physical security analysis
Trusted Computing technologies for CIIP (such as virtualization, Cloud computing, Grid computing)
Trusted Computing policies and models (access policies, authentication models, cryptographic support)
Interconnection and Dependency of CIIs
Trust Models and Trust Infrastructures for systems under attack
Self-healing and self-protection systems and architectures
Forensics for CIIs.
Managing and Forecasting of Security & Privacy Incidents and Impacts
Malware protection (Trojans, viruses, worms, spyware etc)
Security and Privacy of Smart Grids, Cloud Computing and Internet of Things
DDoS attacks and defense mechanisms (Botnets, C&C systems and covert channels)
SCADA Security
Case studies and best practices

Last modified: 2013-01-15 22:23:53