posted by user: bkirk || 6003 views || tracked by 14 users: [display]

PVC Privacy 2015 : Special Issue on Pervasive Privacy and Security

FacebookTwitterLinkedInGoogle

Link: http://www.computer.org/portal/web/computingnow/pccfp1
 
When N/A
Where N/A
Submission Deadline Apr 1, 2014
Notification Due May 27, 2014
Categories    computer science   security   mobile   privacy
 

Call For Papers

Society is increasingly relying on pervasive computing technologies in all domains. However, with the growing adoption of these technologies, we are also seeing more and more issues related to privacy and security.

The aim of this special issue is to explore technologies related to all aspects of privacy and security in pervasive computing. Relevant topics for this special issue include, but are not limited to, the following:

- Privacy and security for pervasive computing domains, such as smart homes, smart cars, healthcare, urban computing, and more
- Privacy and security for pervasive computing technologies, such as smartphones, wireless sensors, wearable computers, RFIDs, cameras, and more
- New methods, techniques, or architectures for collecting, processing, managing, and sharing sensed data in a way that balances privacy, security, and utility
- New approaches for managing privacy and security in pervasive computing domains, both for end-users and for organizations offering services
- User interfaces for conveying to users what data is being sensed and gathered
- User studies probing people's attitudes and behaviors towards privacy and security in pervasive computing domains and/or involving pervasive computing technologies
- Tools, platforms, and user models to help developers improve privacy and security in ubicomp systems
- Experiences with privacy and security for deployed ubicomp systems
- More streamlined ways of authenticating to pervasive computing environments, or using pervasive computing technologies to improve authentication in general
- Security on low-power computing devices
- Establishing trust in pervasive hardware
- Combining privacy with accuracy in location sensing
- Coping with physical threats to pervasive hardware
- Pervasive surveillance and privacy
- technology and policy issues
- New business processes and models involving ubicomp privacy and security
- Incorporating privacy and security into the design and development process of pervasive applications (aka "privacy-by-design")
- The guest editors invite original and high-quality submissions addressing all aspects of this field, as long as the connection to the focus topic is clear and emphasized.
- Review or summary articles — for example critical evaluations of the state of the art, or insightful analysis of established and up-coming technologies—may be accepted if they demonstrate academic rigor and relevance.

Special Issue Guest Editors
- Sunny Consolvo, Google
- Jason Hong, Carnegie Mellon University
- Marc Langheinrich, University of Lugano (USI)

Submission Information

Submissions should be 4,000 to 6,000 words long and should follow the magazine's guidelines on style and presentation. All submissions will be single-blind anonymously reviewed in accordance with normal practice for scientific publications. For more information, contact the guest editors at pvc1-2015@computer.org.

To present works-in-progress directly to the community, visit our Reddit community: www.reddit.com/r/pervasivecomputing.

For general author guidelines or submission details: www.computer.org/pervasive/author.htm or pervasive@computer.org. To submit your article directly to our online peer-review system, go directly to Manuscript Central (https://mc.manuscriptcentral.com/pc-cs).

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
ACII 2018   Advanced Computational Intelligence: An International Journal
WCMC-IoT 2018   WCMC journal, Special issue on Security, Privacy, and Trust on Internet of Things
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
SciSec 2018   The 1st International Conference on Science of Cyber Security
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
SRDS 2018   The 37th IEEE International Symposium on Reliable Distributed Systems
SPIoT 2018   The 7th International Symposium on Security and Privacy on Internet of Things