ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SecATM 2016 - 2016 International Workshop on Security in Air Traffic Management and other Critical Infrastructures

Date2016-08-31 - 2016-09-02

Deadline2016-04-03

VenueSaltzburg, Austria Austria

Keywords

Websitehttps://www.secatm.org

Topics/Call fo Papers

Global air traffic management and other critical infrastructure systems are evolving from siloed, local, proprietary systems to interconnected wide-area information systems. Within the field of air traffic management, there is rapid development, as demonstrated by the FAA NextGen and the European Single European Sky ATM Research programmes. Similar large scale transformation programmes have been launched for critical infrastructure systems. The higher levels of automation and interconnectivity translate into increased security risks and poses challenges to system and security engineering.
Air traffic management (and aviation critical infrastructure) security is understood to include two dimensions:
the self-protection / resilience of the ATM system / critical infrastructure, and
collaboration with other security stakeholders concerning security incidents.
This workshop will focus on security of next-generation air traffic management systems and similar critical information infrastructures. The objective is to provide an interdisciplinary forum for academic and professionals to discuss recent progress and research in this field.
Given the nature of the security dimensions, papers are encouraged to address one dimension or show interdependencies between the both. Papers may address institutional, organisational, methodological, or technological aspects of the security of air traffic management / similar critical infrastructures. Papers may report on on-going or completed research, case-studies, or real-world security development / deployment activities.
Topics
Suggested topics include, but are not limited to the following in ATM and related critical infrastructures:
Security Policy
Security risk assesment and security management
Security (system) validation
Best practices, security proceess optimisation
Secure middleware solutions
Secure information management, enhanced communication, surveillance, and navigation
Challenges of security assessment in a safety-oriented environment or omplex systems
Security situation management including security incident management within and across organisations
Experience reports

Last modified: 2016-03-05 11:39:03