ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

INTRICATE-SEC 2018 - Workshop on Security and Privacy Intricacies in Resource Constrained Computing Environments (INTRICATE-SEC 2018)

Date2018-05-16 - 2018-05-18

Deadline2017-12-10

VenuePedagogical University of Cracow, Poland Poland

Keywords

Websitehttp://mykayem.org/IntricateSec2018.html

Topics/Call fo Papers

Computing under resource constraints is a relatively new field in computer science, in which we seek to develop solutions that are viable in terms of performance. Application examples emerge in rural/remote developing world regions where access to computational resources and in-house human capital (in terms of specialised expertise) is impeded for economic reasons. In such cases, it makes sense to seek cost-effective alternatives to deploying Internet services. Typical solution models rely on mobile phones, and lossy communication networks as a cost effective approach to service delivery. Using a trusted centralised framework for service delivery is not always feasible in these cases, and so distributed management offers a viable alternative. Distributed management however, raises concerns centered around subversion whereby in contrast to standard adversarial models, the malicious party seeks to mask attacks as faults with the goal of gaining some advantage without necessarily provoking a breakdown of the communication network. While seemingly harmless on initial level, when conducted over an extended period and by multiple parties, such attacks can result in unreliable and untrustworthy performance.
Topics...
In this workshop, we are especially interested in papers discussing various facets of resource constrained computing (RCC) networks and systems, from the perspective of Security, Privacy, Reliability, and Performance. Topics include, but are not limited to the following:
Authentication and Authorization for RCC Systems
Anonymity on RCC Systems
Applications of Cryptography to RCC Systems
Combating Fake News, Phishing, Spoofing, and Spam in RCC Systems
Distributed Denial of Service in RCC Networks
Fault Tolerance on RCC Networks
Identity Management Models on RCC Networks
Intrusion Detection and Response on RCC Networks
Studies/Experiences on Social Media and Micro-targeting on RCC Networks
Studies/Experiences on Social Media and Fake News on RCC Networks
Privacy Enhancing Methodologies for RCC Systems
Privacy Preserving Data Publishing on RCC Networks
Privacy Preserving Data Analytics on RCC Systems
Pseudonymity on RCC Systems
Tracking and Profiling on RCC Networks
Trust Management Models for RCC Systems

Last modified: 2017-11-04 16:52:30