ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ASMS 2014 - International Workshop on Active Security Through Multi-Agent Systems

Date2014-06-04 - 2014-06-06

Deadline2013-01-20

VenueSalamanca , Spain Spain

Keywords

Websitehttps://www.paams.net/wasmas14

Topics/Call fo Papers

Security is an essential issue to be covered by current information and communication technologies, as services provided both to systems and users must be reliable. However, most available security related solutions mainly rely on the deployment of prevention and/or detection schemes. This in some sense passivity of the defense system limits in several aspects its capabilities and thus those of the overall environment.
Given the increasing complexity of networking and communication systems at present, proactive security solutions offer a number of benefits with respect to passive security solutions. As such, novel and effective proactive security related approaches are highly encouraged. Adoption of these new technologies and methodologies will contribute to increase the robustness of the environment by leveraging concepts such as response, collaboration, tolerance, auto-configuration and adaptability, etc.
In this context, the goal of the WASMAS workshop is to contribute new advances and trends in the use and deployment of agent-like security related systems, that is schemes composed of pro-active elements with acting capacities. It is expected that this kind of systems will be of indubitable help for developing next generation networks, services and systems.
TOPICS OF INTEREST:
Several main topics in the field of security and protection of services, users, systems and infrastructures, but not limited to them, are:
Anti-spoofing robust solutions
Self-protection and adaptive systems
Collaborative authentication
Localization and position-based security
Non-legitimate events active detection
Tolerance and survivability
Auto-configurable environments
Mobility and pro-active security
Robust access control
Active defenses and hacking back strategies
Resilience against maliciousness
Collaborative and distributed systems for security
Defenses against collusion attacks
Agent-based systems and RoQ
Cybercrime prosecution schemes
Response/Reaction mechanisms
New proposals against DDoS events
Low-cost security related procedures
Active security in the cloud
Privacy-enhanced technologies
Strategic applications

Last modified: 2013-10-19 23:26:20