ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

EuroSPEC 2019 - 2019 European Workshop on Security and Privacy in Edge Computing (EuroSPEC 2019)



VenueStockholm, Sweden Sweden



Topics/Call fo Papers

The main goal of Fog Computing and other related Edge paradigms, such as Multi-Access Edge Computing, is to decentralize the Cloud and bring some of its services closer to the edge of the network, where data are generated and decisions are made. Cloud-enabled edge platforms will be able to cooperate not only with each other but with the cloud, effectively creating a collaborative and federated environment. This paradigm shift will fulfill the needs of novel services, such as augmented reality, that have particularly stringent requirements like extremely low latency. It will also help improve the vision of the Internet of Things by improving its scalability and overall functionality, among other benefits.
To enable this vision, a number of platforms and technologies need to securely coexist, including sensors and actuators, edge-deployed systems, software-defined networks, hardware virtualization, data mining mechanisms, etc. However, this paradigm shift calls for new security challenges and opportunities to leverage services for new scenarios and applications. The field of edge computing security is still largely unexplored, and demands further attention from the research community and industry in order to unleash the full potential of this paradigm.
This workshop expects original research papers on, but not limited to, the topics described below:
Edge devices security
Attacks and Countermeasures to Edge computing platforms
Authentication and Access control in Edge computing
Accountability and Accounting in Edge computing
Identity management systems in Edge computing
Secure federation of Edge computing devices
Secure Orchestration and Management of Edge devices
Secure Software-Defined Networking for Edge computing
Secure Virtualization in Edge Computing
Secure Migration of resources in Edge Computing
Data and Computation integrity in Edge Computing
Trust and Reputation Management in Edge computing
Privacy in Edge Computing
Intrusion Detection and Prevention systems for Edge computing
Digital Forensics in Edge Computing
Risk Analysis in Edge Computing
Incident Management in Edge Computing

Last modified: 2019-03-03 10:10:10