posted by user: romanUMA || 8023 views || tracked by 21 users: [display]

SecIW 2013 : Security in a Completely Interconnected World: Special Issue of Security and Communication Networks Journal (Wiley)

FacebookTwitterLinkedInGoogle

Link: http://www.nics.uma.es/seciot12/files/SCNSI049.pdf
 
When N/A
Where N/A
Submission Deadline Oct 15, 2012
Notification Due Jan 15, 2013
Final Version Due Apr 15, 2013
Categories    security   IOT   M2M   internet of things
 

Call For Papers

===============================================================
Special Issue on "Security in a Completely Interconnected World"
Security and Communication Networks Journal
Paper submission deadline: October 15th 2012 (extended)
===============================================================

Scope
-----
The convergence of multiple paradigms, visions, and technologies – Internet of
Things (IoT), People (IoP) and Services (IoS); Ambient Intelligence (AmI);
Machine-to-Machine (M2M); and many others – is giving birth to a completely
interconnected world. In this world, every entity (be it a machine, a daily
object, a person, or anything) can have a globally locatable, addressable,
and readable virtual counterpart, which can collaborate with each other in the
provisioning of various services. This concept is slowly becoming a reality:
specific standards are being developed, new research results are being
obtained, and novel services are being provided by both newborn start-ups and
experienced companies in various areas (e.g., SCADA systems, smart grids,
smart cities). However, several significant obstacles hinder the full
implementation of this concept, and among them are the security issues. In
fact, as there is already a parallel economy exploiting the foundational
weaknesses of the Internet, this new environment will surely be targeted by
original and ingenious malicious models. The challenge here is to prevent the
growth of such models or at least to mitigate and limit their impact.
Therefore, it is necessary to provide strong foundations to those paradigms
that require it (such as IoT), and develop various robust and resilient
security mechanisms that allow the secure interaction between entities even
in restrictive contexts. Precisely, the goal of this special issue is to
publish cutting-edge research results and innovation case studies that will
help to set the security foundations of this new interconnected world.

Topics of Interest
------------------

In terms of security challenges, topics of interest include but are not
limited to:
* Novel security problems and challenges.
* Privacy risks and data management problems.
* Identifying, authenticating, and authorizing entities.
* Development of trust frameworks for secure collaboration.
* Cryptographic primitives and algorithms for constrained devices.
* Secure connection of heterogeneous ecosystems and technologies.
* Legal challenges and governance issues.
* Fault tolerance and resilience to external and internal attacks.
* Context-Aware security.
* Security of cloud-based M2M/IoT platforms.
* Distributed policy enforcement and rights management.
* Usability of security and privacy technologies.
* Security in social interactions between virtual entities.

Submission
----------

Papers must represent high-quality and previously unpublished works. Original
research papers are solicited in all relevant areas (IoT, M2M, etc) on the
topic of security for the completely interconnected world. All submissions
will be peer reviewed by at least three experts working in the areas. The
guidelines for prospective authors can be found at
http://www.interscience.wiley.com/journal/security. Prospective authors
should submit their papers online at http://mc.manuscriptcentral.com/scn.
When submitting the papers, the authors should make sure to choose the
Manuscript type as 'Special Issue', enter the 'Running Head' as 'SCN-SI-049',
and the 'Special Issue title' as and 'Security in a Completely Interconnected
World', respectively. Failure to do so may be subject to rejection
without review.

Guest Editors
-------------

Jim Clarke
Waterford Institute of Technology, Ireland
E-mail: jclarke@tssg.org

Stefanos Gritzalis
University of the Aegean, Greece
E-mail: sgritz@aegean.gr

Rodrigo Roman
Institute for Infocomm Research, Singapore
E-mail: rroman@i2r.a-star.edu.sg

Jianying Zhou
Institute for Infocomm Research, Singapore
E-mail: jyzhou@i2r.a-star.edu.sg

Important Dates
---------------

Manuscript due October 15th 2012 (extended)
First Review Phase Results January 2013
Final Acceptance Notification March 2013
Camera Ready Manuscript due April 2013
Publication The 2nd half of 2013 (Tentative)

Related Resources

Special Topics on Cybersecurity 2019   Special Topics on Cybersecurity - The 5th International Conference on Communication, Management and Information Technology
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
DSN 2019   Dependable Systems and Networks
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
IEEE S&P 2019   IEEE Symposium on Security and Privacy
IoTBDS 2019   3rd International Conference on Internet of Things, Big Data and Security
ACNS 2019   International Conference on Applied Cryptography and Network Security
NECO 2018   7th International Conference of Networks and Communications