EFINS 2015 - 2nd International Workshop on the Emerging Future Internet and Network Security
Topics/Call fo Papers
The Internet is the main information exchange means nowadays. It has become the core communication environment, not only for business relations, but also for social and human interaction. Yet, the immense success of Internet has created even higher hopes and expectations for new immersive and real-time applications and services, without guarantees that the Internet as we know it today will be able to support them. The new demands can be addressed to a certain degree through incremental infrastructure investment (i.e. more and more bandwidth in wireline, wireless and mobile networks) combined with “over-dimensioning”. However, analyses have shown that increasing the bandwidth to peta-bps on the backbone network will not suffice due to new qualitative requirements in, for example, highly critical services such as e-health applications, clouds of services and clouds of sensors, new social network applications like collaborative 3D immersive environments, new commercial and transactional applications, new location-based services and so on. Therefore, research efforts have been considering fundamental modifications to the current Internet and hence, novel communication architectures and new trends have been recently proposed under the umbrella of Future Networks. Research areas that could be seen as components of Future Networks include new communication models such as Information Centric Networks, Software Defined Networks, Network Virtualization and Cloud Networking. In addition to other trends that could be deployed with minimal modifications to the current TCP/IP suite such as the Internet of Things, Peer-to-Peer and Device-To-Device networks.
Our experience of the Internet as an unsecure environment is mainly due to the fact that security has not been taken into consideration earlier in the design stage; security protocols and mechanisms are adds-on to the TCP/IP suit and they have always been devised as reactions to attacks. Learning from the lessons of the Internet, research in Future Networks should view security as a key part of the network architecture and consider to integrate security at the design stage. The fact that Future Networks introduce novel communication models which are different from the Internet’s model implies that current security mechanisms and protocols might not be appropriate for or compatible with the new communication models. Therefore, modifications to current mechanisms or even new security approaches have to be considered. In addition to the security threats found in the current Internet, Future Networks will have to deal with new threats. A key challenge here is how to integrate security into system without compromising the flexibility, dynamics and ubiquity of Future Networks.
Scope and Interests
The International Workshop on the Emerging Future Internet and Network Security is intended to bring forth the recent advancements in these areas; it invites original contributions on emerging internetworking and communication models with an emphasis on Security, Privacy and Trust in issues in these models. Topics of interest includes but not limited to:
Accountability verses anonymity and privacy
Application level trust, privacy and security
Architectures related to trust, privacy and security
Authentication, Authorization and Accounting (AAA) for future networks
Cross-layer security
Key management issue and solutions
Identity management
Privacy, anonymity and traceability
Threat and vulnerability analysis for future networks
Trust technologies, technologies for building trust in future networks
Submission Instructions
Papers submitted to EFINS2015 should be written in English conforming to the IEEE Conference Proceedings Format (8.5" x 11", Two-Column). The paper should be submitted through the EasyChair paper submission system at the workshop website. The length of the papers should not exceed 6 pages + 2 pages for over length charges.
Accepted and presented papers will be included into the IEEE Conference Proceedings published by IEEE CS CPS and submitted to IEEE Xplore and CSDL. Authors of accepted papers, or at least one of them, are requested to register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE CS after the conference. Distinguished papers presented at the conference, after further revision, will be recommended to special issues of reputable SCI/EI-indexed journals.
Submitting a paper to the workshop means that, if the paper is accepted, at least one author should attend the Symposium and present the paper.
Our experience of the Internet as an unsecure environment is mainly due to the fact that security has not been taken into consideration earlier in the design stage; security protocols and mechanisms are adds-on to the TCP/IP suit and they have always been devised as reactions to attacks. Learning from the lessons of the Internet, research in Future Networks should view security as a key part of the network architecture and consider to integrate security at the design stage. The fact that Future Networks introduce novel communication models which are different from the Internet’s model implies that current security mechanisms and protocols might not be appropriate for or compatible with the new communication models. Therefore, modifications to current mechanisms or even new security approaches have to be considered. In addition to the security threats found in the current Internet, Future Networks will have to deal with new threats. A key challenge here is how to integrate security into system without compromising the flexibility, dynamics and ubiquity of Future Networks.
Scope and Interests
The International Workshop on the Emerging Future Internet and Network Security is intended to bring forth the recent advancements in these areas; it invites original contributions on emerging internetworking and communication models with an emphasis on Security, Privacy and Trust in issues in these models. Topics of interest includes but not limited to:
Accountability verses anonymity and privacy
Application level trust, privacy and security
Architectures related to trust, privacy and security
Authentication, Authorization and Accounting (AAA) for future networks
Cross-layer security
Key management issue and solutions
Identity management
Privacy, anonymity and traceability
Threat and vulnerability analysis for future networks
Trust technologies, technologies for building trust in future networks
Submission Instructions
Papers submitted to EFINS2015 should be written in English conforming to the IEEE Conference Proceedings Format (8.5" x 11", Two-Column). The paper should be submitted through the EasyChair paper submission system at the workshop website. The length of the papers should not exceed 6 pages + 2 pages for over length charges.
Accepted and presented papers will be included into the IEEE Conference Proceedings published by IEEE CS CPS and submitted to IEEE Xplore and CSDL. Authors of accepted papers, or at least one of them, are requested to register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE CS after the conference. Distinguished papers presented at the conference, after further revision, will be recommended to special issues of reputable SCI/EI-indexed journals.
Submitting a paper to the workshop means that, if the paper is accepted, at least one author should attend the Symposium and present the paper.
Other CFPs
- Workshop on Adaptive Natural Language Processing
- 11TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE - DEPENDABILITY IN PRACTICE
- 7th International Workshop on Software Engineering for Resilient Systems
- 5th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2015)
- 9th International Conference on Frontier of Computer Science and Technology (FCST 2015)
Last modified: 2015-01-20 23:29:27