ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Security 2014 - Special Track on Security

Date2014-03-30 - 2014-04-02

Deadline2013-10-30

VenueDubai , UAE - United Arab Emirates UAE - United Arab Emirates

Keywords

Websitehttp://www.ntms-conf.org/ntms2014/

Topics/Call fo Papers

The Security Track will address all the security aspects of design, implementation, deployment, architectures and modeling of heterogeneous wired and wireless computer networks, of virtualization technology, as well as of pervasive computer applications. It will also provide dynamic forums for researchers, students and professionals to present their research results and development in these areas and will offer the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to information and system security.
Topic areas of interest of this track include, but are not limited to the following:
Thematic areas:
Security engineering. Methodologies, formalisms, modeling, tools, code instrumentation ....
Cryptography. Algorithms, protocols, attacks...
Security in distributed systems.
Cryptographic Hardware and Embedded Systems.
Light-weight cryptography.
Information Hiding. Steganography ...
Privacy and Anonymity.
Security assurance. Evaluation, testing, formal proofs, certification.
Quantum Cryptography and QKD.
Trusted computing. Analyses and attacks, practical applications...
Surveillance and monitoring. Intrusion detection, monitoring techniques, architectures,...
Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...
Social and psychological aspects of security. User-centered security evaluation, perception of security and threats...
Security and usability.
Application areas:
Service Oriented Computing. Platform security, access control, Security of the SOC processes (Negotiation, Orchestration), Identification of services...
Cloud computing. Platform security, data protection, software protection, surveillance and dynamic reaction.
Ubiquitous computing, pervasive computing and ambient intelligence. Secure system models, development support, dynamic reaction, self-* systems
Embedded systems. Dynamic replaceability, system security assessment, secure system composition, tampering-resistance...
Security in system evolution. Design for secure evolution, evolution-oriented surveillance, security patches...
Critical infrastructures. Protection architectures, redundancy and replication, scalability issues...
Security Program co?chairs
George Spanoudakis ? The City University, United Kingdom
Andrew Marrington ? Zayed University, UAE
Farkhund Iqbal ? Zayed University, UAE
Security TPC members

Last modified: 2013-08-20 22:53:16