posted by user: STM_events || 4151 views || tracked by 3 users: [display]

Chip-to-Cloud Security Forum 2012 : Chip-to-Cloud Security Forum

FacebookTwitterLinkedInGoogle

Link: http://www.chip-to-cloud.com
 
When Sep 19, 2012 - Sep 20, 2012
Where Nice, French Riviera
Submission Deadline Mar 23, 2012
Notification Due Apr 30, 2012
Final Version Due Aug 31, 2012
Categories    secure embedded systems techno   trusted mobile comm. & transac   internet of things
 

Call For Papers

Call for Papers

Chip-to-Cloud Security Forum
Smart Trusted Technologies & Services for the Networked Society
http://www.chip-to-cloud.com


BACKGROUND & SCOPE
The Chip-to-Cloud Security Forum is the continuation of Smart Event, combining together Smart Mobility, e-Smart and partly World e-ID conferences into a wide-ranging single event dedicated to the Future Networked Society security.
For 12 years, Smart Event has addressed Academic and Industry key advances in Smart Security. Starting from purely embedded and smart cards security, then adding mobile and biometrics applications, Smart Event has gradually enlarged its scope to cover a larger "digital security domain" including trusted applications in telecoms, Internet, banking, e-gov., etc. Along with the continuously increasing performance of the nano-, micro- technologies and the cheaper and faster modern communication networks, every physical resource now form part of massive infrastructures supporting on-line services such as M2M, Mobile Internet, Mobile Payments, Cloud Computing Applications & Services, Social Networks... This shift from off-line secure personal devices (mostly embedded secure microcontrollers and smart cards) based transactions to mobile and on-line trusted services is reflected by the new title Chip-to-Cloud Security Forum.
Taking a step forward, those connected services announce a near future best described by the Internet of Things (IoT) design paradigm: a smart environment where devices, sensors, actuators, mobile phones, etc. are able to interact with each other and cooperate through the Internet. This perspective raises new security, trust and privacy challenges at unseen levels, impacting the digital world in all its components, from the "things" to users' everyday life, from the physical space to the society. The Chip-to-Cloud Security Forum will also address these IoT's broad security challenges arising from our Networked Society.

OBJECTIVES
The Forum offers a high level international conference for researchers from Academia, Industry experts and engineers, Industry decision-makers, practitioners from standardization bodies and government professionals to share their vision, to figure out strategies for the future, to point out business opportunities and seek collaboration prospects, to present state-of-the-art research and discuss the most recent advances in embedded, mobile and cloud security at both hardware and software levels with regards to the dynamics of these technologies towards the Internet of Things challenges.
The Chip-to-Cloud Forum Program Committee is looking for technical papers describing original ideas groundbreaking results, new techniques, new methodologies, proposing new research directions, highlighting standardization and regulatory issues for resolving open problems spanning from all aspects of current and future IoT systems security and trust ability.
Reinforcing the interactions between academic research and Industry:
In order to reinforce the interactions between academic research and Industry, the Chip-to-Cloud Security Forum Program Committee is also looking for Industry specific papers preferably focusing on:
- academic research challenges resulting from the industry context,
- the design, implementation, deployment and use cases of realistic systems that have been built and deployed,
- the engineering challenges faced by the Industry in a commercial context and versus business opportunities, success stories and/or failures.

LIST OF TOPICS
The submissions may address one or more of the topics mentioned below or others that authors believe to be of great interest to the audience.

SECURE EMBEDDED SYSTEMS TECHNOLOGIES
- Secure embedded systems design:
- Advanced architectures
- Secure HW/SW co-specification
- Formal verification
- HW/SW co-validation
- System validation
- Run-time & design time reconfigurable secure platforms & processors
- Multiple constraints driven embedded systems design & optimization
- Secure hardware technologies
- Secure software architectures & engineering
- Secure embedded software & OS
- Advances in ubiquitous and domain specific cryptography, PUFs, etc.
- Strong authentication technologies (HW& SW) for Cloud Computing, Services Security and other Enterprise and personal usages.
- Advances in embedded Java & Java Card
- NFC and contactless technologies security
- (Mobile) Trusted Computing architectures
- Packaging issues & innovations

TRUSTED MOBILE COMMUNICATIONS & TRANSACTIONS
- Advances in Secure Element technologies: USIM/UICC, embedded SIM, SD card
- TEE in mobile devices
- Smart card web server
- Trusted Services Management technologies
- Smartphone's security: device, OS and secure mobile apps development
- Contactless/wireless /mobile systems security risks analysis
- Advances in NFC and contactless technology
- Electronic Identity security:
- Biometrics advances & applications
- e-ID domain specific cryptography
- e-ID based secure applications
- Privacy protection
- Mobile Internet, Mobile and cloud computing
- Trusted mobile services
- Use cases and deployments of m-payment, transportation, media & content applications
- Smart mobility research projects such as impaired and handicapped people, location-aware apps, smart cities, etc.
- Innovative business models between MNOs/ Service Providers/Banks/Other Stakeholders

TOWARDS
THE INTERNET OF THINGS
- Cloud Computing Security, Security as a Service (SaaS)
- M2M Deployment & Security
- M2M applications to:
- Transportation, automotive,
- Smart grids/meter,
- SCADA system,
- Smart physical infrastructure,
- Energy efficiency,
- Environmental monitoring, medical devices, telematics and robotics...
- LTE and mobile broadband security issues
- Mobility in enterprise security management
- Cyber Physical Systems and Cyber Physical Society security issues
- Wireless Sensor Networks (WSNs) and Advanced Wireless Sensors
- Wireless Personal Area Networks technologies (UWB, 6LoWPan, etc.)
- Wireless Body Area Networks

HORIZONTAL CONTRIBUTIONS:
- Standardization issues & progresses for increasing trust and interoperability
- Security, privacy and content protection: standardization issues & progresses, security evaluations methodologies (attacks & countermeasures, best practices, etc.), certifications criteria and schemes
- Products and systems security evaluation and certification standards
- Transnational collaborative R&D frameworks, initiatives and programs
- Transnational regulatory issues & progresses to make the internet and services infrastructures more trustable and secure.

Related Resources

PerIoT 2020   Software Approaches to Improve the Performance of IoT Systems - Applied Sciences (IF 2.217)
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
WSCG 2020   28. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision 2020
Middleware 2020   International Middleware Conference
IEEE-JETCAS-AICHIP 2020   IEEE JETCAS: Special Issue on Communication-aware Designs and Methodologies for Reliable and Adaptable On-Chip AI SubSystems and Accelerators
ACM-CNIOT 2020-Ei/Scopus 2020   2020 International Conference on Computing, Networks and Internet of Things (CNIOT 2020)
NLP-ARCHES 2020   NLP architectures in the age of end-to-end deep-learning systems
IJU 2020   International Journal of Ubiquitous Computing
Mutual Images International Workshop 2020   Japanese Pilgrimages: Experiences and Motivations Behind Cultural, Spiritual and Religious Peregrinations to and from East Asia
IoT 2020   10th International Conference on the Internet of Things