posted by user: wpetrae || 1653 views || tracked by 4 users: [display]

PSPAE 2011 : 3rd Workshop on Privacy and Security in PervasiveEnvironments

FacebookTwitterLinkedInGoogle

Link: http://www.petrae.org
 
When May 25, 2011 - May 27, 2011
Where Crete, Greece
Submission Deadline Mar 10, 2011
Notification Due Mar 20, 2011
Final Version Due Mar 25, 2011
 

Call For Papers

**************************************

Call for Papers - Workshop PSPAE 2011
**************************************
The 3rd Workshop on
"Privacy and Security in Pervasive Environments "

*** Proceedings published by ACM (electronic) **
(in conjunction with 4th International Conference on
PErvasiveTechnologies Related to Assistive Environments
(PETRA) 2011)
Crete, Greece


Workshop Theme and Goals
Pervasive computing pushes forward a vision where technology is integrated into everyday objects with the intent of facilitating the life of humans and making their interaction with the surrounding environment simpler. A critical element of pervasive and ambient intelligence environments is awareness: computing environments become aware of the activities of their users and a lot of their daily activities can be captured and recorded for future use. The users frequently ignore the amount of their personal data being collected and processed or shared wirelessly and how much their privacy may be invaded. An understanding of privacy in the domain of pervasive computing and learning to address privacy concerns is very critical. Ensuring the security and privacy of users' data is a critical prerequisite to creating public trust for pervasive environments. It is therefore, necessary for such environments to be designed, implemented and used in compliance with data subjects' fundamental rights while the adoption of specific safeguards is required. In addition, since misuse of collected data is easily enabled, preventive measures are needed. .

Privacy-Enhancing Technology (PET) concepts have been developed and applied while guidelines are found in the literature on how to deal with data so that the application of pervasive technology to become privacy-friendly. However, using privacy enabling and enhancing tools is not always easy. Pervasive computing environments are based on the use of wireless devices that have limited processing power, bandwidth, throughput, memory etc. These factors put a resource limitation on implementing resource demanding tools and protocols for privacy protection. Additionally, legal support for widespread use of PETs is missing and the introduction of additional legislation should be examined.





Topics of Interest

We are interested in original papers and case studies describing advances in all areas of assistive technologies for physical, occupational therapy and rehabilitation, including but not limited to:
Privacy, security and trust in the design of pervasive and ambient intelligence environments
Ethical issues of Ambient Intelligence
Ethical guidelines for the design of pervasive and ambient intelligence environments
User and/or usability/user experience studies related to the design of pervasive and ambient intelligence environments
Policies and practices for access, authentication, authorization and auditing in pervasive and ambient environments
Policies for information sharing in pervasive environments
User and context awareness in pervasive computing and ambient intelligent environments
Access Control enforcement, authentication and secure data access in pervasive environments
Encryption, cryptographic techniques to ensure privacy and security in pervasive environments
Case studies in respect to privacy and security in pervasive environments
Developing secure pervasive/ambient infrastructures
Important Dates
Paper Submission Deadline: March 10, 2011

Acceptance Notification: March 20, 2011

Workshop Chairs
Grammati Pantziou
Technological Educational Institution (T.E.I.) of Athens, Greece
Petros Belsis
T.E.I. of Athens, Greece
Tassos Dimitriou
A.I.T., Athens, Greece

Submission Information
Submissions should be in ACM style format and will be accepted as either full paper (8 pages) or short paper (4 pages). For Latex and MS Word templates please go to http://www.acm.org/sigs/publications/proceedings-templates Please refer also to the conference submission guidline latest announcements.



Related Resources

TrustCom 2020   The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
Sensors (MDPI) 2020   Special Issue on Security, Trust and Privacy in New Computing Environments
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
ESPR-IoTBD 2020   Applied Scieces (Q1), Enterprise Security, Privacy and Risk for Internet of Things and Big Data (ESPR-IoTBD)
IEEE HotICN--Ei, scopus 2020   2020 3rd IEEE International Conference on Hot Information-Centric Networking (IEEE HotICN 2020)--Ei Compendex, scopus
SSR 2020   Security Standardisation Research 2020
VSC @IEEE WETICE 2020   Track on Validating Software for Critical Systems (VSC) @IEEE WETICE 2020
3rd ICTEL 2021   International Conference on Teaching, Education & Learning, 23-24 March, Singapore