T(CI) 2013 - T(CI)2: Trusted Computing for Critical Information Infrastructures
Date2013-07-10 - 2013-07-12
Deadline2013-03-31
VenuePiraeus, Greece
Keywords
Websitehttps://iisa2013.unipi.gr
Topics/Call fo Papers
Critical Information Infrastructures (CIIs) are complex systems including both cyber (control) and physical (operational) components. The proper control, connectivity and interoperability of CIIs are vital for the normal operation, safety and security of major facilities and services such as energy, water provision, ICT, financial services and transportation.
However, the need for remote access and control, the provision of e/m-services that are accessible through the Internet and the dependencies between CIIs exposes them to various threats, while their distributed nature makes them subject to hardware, software and human-behavior vulnerabilities. Possible cyber attacks against CIIs may lead to severe impact due to service unavailability (e.g. via DoS and DDoS attacks), unauthorized access and data exposure and/or modification (e.g. via worms, viruses and drive-by exploits) or unauthorized administration (e.g. via hidden Command & Control channels, botnets and rootkits).
Our goal is to bring together academic and industrial researchers, designers, and service providers focusing on Critical Information Infrastructure Protection during normal or emergency operation modes. Emphasis will be given to cyber security technologies, architectures, controls and policies that create a Trusted Computing Environment, in order to provide trustworthy and reliable Critical Information Infrastructures.
Topics of interest include but are not limited to:
Critical Information Infrastructure Protection (CIIP), including energy, ICT and transportation
Cyber-physical security analysis
Trusted Computing technologies for CIIP (such as virtualization, Cloud computing, Grid computing)
Trusted Computing policies and models (access policies, authentication models, cryptographic support)
Interconnection and Dependency of CIIs
Trust Models and Trust Infrastructures for systems under attack
Self-healing and self-protection systems and architectures
Forensics for CIIs.
Managing and Forecasting of Security & Privacy Incidents and Impacts
Malware protection (Trojans, viruses, worms, spyware etc)
Security and Privacy of Smart Grids, Cloud Computing and Internet of Things
DDoS attacks and defense mechanisms (Botnets, C&C systems and covert channels)
SCADA Security
Case studies and best practices
However, the need for remote access and control, the provision of e/m-services that are accessible through the Internet and the dependencies between CIIs exposes them to various threats, while their distributed nature makes them subject to hardware, software and human-behavior vulnerabilities. Possible cyber attacks against CIIs may lead to severe impact due to service unavailability (e.g. via DoS and DDoS attacks), unauthorized access and data exposure and/or modification (e.g. via worms, viruses and drive-by exploits) or unauthorized administration (e.g. via hidden Command & Control channels, botnets and rootkits).
Our goal is to bring together academic and industrial researchers, designers, and service providers focusing on Critical Information Infrastructure Protection during normal or emergency operation modes. Emphasis will be given to cyber security technologies, architectures, controls and policies that create a Trusted Computing Environment, in order to provide trustworthy and reliable Critical Information Infrastructures.
Topics of interest include but are not limited to:
Critical Information Infrastructure Protection (CIIP), including energy, ICT and transportation
Cyber-physical security analysis
Trusted Computing technologies for CIIP (such as virtualization, Cloud computing, Grid computing)
Trusted Computing policies and models (access policies, authentication models, cryptographic support)
Interconnection and Dependency of CIIs
Trust Models and Trust Infrastructures for systems under attack
Self-healing and self-protection systems and architectures
Forensics for CIIs.
Managing and Forecasting of Security & Privacy Incidents and Impacts
Malware protection (Trojans, viruses, worms, spyware etc)
Security and Privacy of Smart Grids, Cloud Computing and Internet of Things
DDoS attacks and defense mechanisms (Botnets, C&C systems and covert channels)
SCADA Security
Case studies and best practices
Other CFPs
- Signal Processing for Biometric Authentication
- The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering
- 2013 International Conference on Educational Research and Sports Education (ERSE 2013)
- Third ACM MobiHoc Workshop on Pervasive Wireless Healthcare
- International Conference on Computing, Communication and Advanced Network
Last modified: 2013-01-15 22:23:53