ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

PASS4CI 2015 - International Workshop on Privacy, Data Assurance, Security Solutions for Cloud Computing and Internet-of-Things (PASS4CI-2015)

Date2015-10-26 - 2015-10-28

Deadline2015-07-15

VenueLiverpool, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://www.iidi.napier.ac.uk/c/download...

Topics/Call fo Papers

The Cloud computing and Internet of Things (IoT) are unleashing the next wave of innovations due to its inherent capability of connecting everything in physical world into cyberspace from/to everywhere. The realisation of Cloud and IoT does have the massive potential of providing social and economic benefits, however, also requires collaborative and sustained efforts from the Societies of Communications, Computing, and Electronics over the years to come. Many challenging issues need to be tackled quickly and effectively. One significant challenge is the exposed security and privacy concerns since the globally connected devices pose more hidden security and privacy risks. On the other hand, it is very difficult to deploy advanced cryptographic algorithms and protocols due to hardware constraints. To pave the way for a brighter Cloud-IoT future, many technological aspects need to be considered, such as data security, privacy, access control, information assurance, trust management, secure service interoperability, and mobility. This workshop is focusing on exploiting feasible ways of improving privacy, security, and data assurance in Cloud computing, IoT and promoting IoT applications. Potential topics include, but are not limited to:
Privacy and security issues in IoT
Dynamic trust management for IoT applications
Physical-layer security
Cyber-physical system
SCADA system
Trustworthy users interfaces
Machine-to-machine communications
Intrusion detection and prevention
Vulnerability, exploitation tools, Malware, Botnet, DDoS attacks
Mobile security, Android security, and trusted devices
Security metrics and performance evaluation, traffic analysis techniques
Social, economic and policy issues of trust, security and privacy
Security on low-power computing devices;
Trust establishment in IoT users;
Information-theoretic security
IoT applications in environmental monitoring, infrastructure management, medical and healthcare systems, transportation systems, and energy systems (such as smart grid)

Last modified: 2015-06-17 21:08:39