ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SUC 2019 - 1st International Workshop on Security of Ubiquitous Computing (SUC 2019)

Date2019-08-19 - 2019-08-23

Deadline2019-03-19

VenueLeicester, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttp://www.smart-world.org/2019/uic/GCUICA

Topics/Call fo Papers

The development of basic technologies such as network technology, computer technology and sensor technology has promoted the development of ubiquitous computing. The purpose of ubiquitous computing is to create an environment full of computing and communication capabilities, and to integrate this environment with people gradually. In this integration space, people can access digital services transparently at anytime and anywhere.
Ubiquitous computing environment is a mobile and distributed information system, which involves many kinds of networks and information technologies. While designing cryptographic primitives, access control models, security protocols and security systems, the characteristics of ubiquitous computing such as openness, cross-domain, mobility, environment awareness and limited resources should be taken into account.
This is the first SUC conference, and the purpose of this conference is to gather researchers and practitioners from academia and industry, to focus on discussing and identifying potential security risks and problems in Ubiquitous Computing, to classify them, and to summarize and exchange existing solutions. The expected outcomes are as follows:
> Summarizing the trust management mechanism and access control scheme in ubiquitous computing.
> Exploring privacy protection scheme in ubiquitous computing environment.
> Envisaging the future research directions to solve the security problems of ubiquitous computing.
Topics of the Workshop
This workshop aims to be a forum for sharing security issues and solutions in ubiquitous computing. The main topics of the workshop are as follows (but not limited to):
Network Trust Management Based on User Identity
Data Transmission Security
Inter-device Access Control Based on Constrained Physical Range
Access Control in Distributed Computing Environment
Terminal Security in Ubiquitous Computing Environment
Privacy Protection Scheme for Ubiquitous Computing
System Security Scheme for Ubiquitous Computing
Data Storage Security in Ubiquitous Computing Networks
Security in Wireless Network and Mobile Systems
Security of IoT Systems
Security of Operation Systems
Computer Security

Last modified: 2019-03-11 16:54:31