posted by user: iori_iagami || 916 views || tracked by 1 users: [display]

ETAA 2020 : 3rd International Workshop on Emerging Technologies for Authorization and Authentication

FacebookTwitterLinkedInGoogle

Link: https://www.iit.cnr.it/etaa2020/index.html
 
When Sep 14, 2020 - Sep 18, 2020
Where Online (Guildford, Surrey,UK)
Submission Deadline Jul 1, 2020
Notification Due Jul 30, 2020
Final Version Due Aug 25, 2020
Categories    cybersecurity   access control   authentication   behavioral analysis
 

Call For Papers

IT devices are day-by-day becoming more pervasive in several application fields and in the everyday life. The major driving factors are the ever increasing coverage of the Internet connectivity, the extreme popularity and capillarity of smartphones, tablets and wearables, together with the consolidation of the Internet of Things (IoT) paradigm. As a matter of fact, interconnected devices directly control and take decisions on industrial processes, regulate infrastructures and services in smart-cities, and manage quality-of-life and safety in smart-homes, taking decisions with user interactions or even autonomously. The involvement of these devices in so many applications, unfortunately introduces a set of unavoidable security and safety implications, related to both the criticality of the aforementioned applications and to the privacy of sensitive information produced and exploited in the process. To address these and other related issues, there is an increasing need of instruments to control the access and the right to perform specific actions on devices or data. These instruments need to be able to cope with the high complexity of the considered applications and environments, being flexible and adaptable to different contexts and architectures, from centralized to fully-distributed, able to handle a high amount of information as well as taking into account non-conventional trust assumptions. The considered technologies should regulate the actions of both human users and autonomous devices, being effective in enforcing security policies, still without introducing noticeable overhead, both on the side of performance and user experience. Hence, the design of secure and efficient mechanisms for continuous authentication, requiring limited-to-no active interaction is solicited. The ETAA workshop aims at being a forum for researchers and practitioners of security active in the field of new technologies for authenticating users and devices, and enforce security policies in new and emerging applications related to mobile/wearable devices and IoT.

Due to Covid-19 outbreak, ETAA and the whole ESORICS conference will be fully digital.


Topics of interest include but are not limited to:

Behavioral Authentication Mechanisms
Emerging Technologies for Biometric Authentication
Novel Privacy challenges in Biometric Authentication
Context-based evolutionary policies.
Access and Usage Control in Mobile and Distributed Systems
Access and Usage Control in IoT
Social, Ethic and Legal Aspects of Biometric and Behavioral Authentication
Legal, Ethic and Forensic Aspects of Authorization
Aspects and Models of Authentication and Authorization through social networks.
Novel schemes for Trust and Reputation in Distributed Environments
Policy languages for advanced Access and Usage Control
Enforcement for Seamless and Continuous Authentication
Advanced authentication and authorization techniques for protecting Critical Infrastructures
Authentication protocols and Cryptography for IoT and Critical Infrastructure
Application of advanced authentication and authorization techniques to specific scenarios


Important Dates

Submission deadline: June 15th
Acceptance Notification: July 30th
Camera-ready versions: August 25th


Paper Submission Guidelines

Papers should be submitted written in English following the Springer LNCS format template. All papers must have an abstract and should present original results. Regular papers can be up to 18 pages long, including Bibliography and well marked appendices. Short papers presenting case studies and preliminary results can be up to 8 pages long. Submitted papers should not be under consideration of any journal or conference or workshop with proceedings.

Please submit your paper through the Easychair following the link: https://easychair.org/conferences/?conf=etaa2020

Related Resources

JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ICENT--EI, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
SPPR 2020   9th International Conference on Signal, Image Processing and Pattern Recognition
ICENT--EI Compendex, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
HELMeTo 2021   3rd International Workshop on Higher Education Learning Methodologies and Technologies Online
FDAE_AI_BDA 2020   Special Issue on Forensics Data Analytics Enhancement via Artificial Intelligences and Big Data Analytics
4th Rome ICSSH 2021   4th Rome – International Conference on Social Science & Humanities (ICSSH), 07-08 September 2021
IEEE TDSC - XAI-CTI 2020   IEEE Transactions on Dependable and Secure Computing Special Issue on Explainable AI for Cyber Threat Intelligence (XAI-CTI) Applications
ML_BDA 2021   Special Issue on Machine Learning Technologies for Big Data Analytics