posted by user: viv || 4951 views || tracked by 12 users: [display]

RT2ND 2015 : International Workshop on Risk and Trust in New Network Developments


When Aug 24, 2015 - Aug 28, 2015
Where Toulouse, France
Submission Deadline Apr 1, 2015
Notification Due May 11, 2015
Final Version Due Jun 8, 2015
Categories    security   trust   computer networks   network security

Call For Papers

RT2ND 2015: International Workshop on Risk and Trust in New Network Developments
to be held in conjunction with the 10th International Conference on Availability, Reliability and Security (ARES 2015 –

August 24-28, 2015
Université Paul Sabatier
Toulouse, France

The drive of being connected anywhere and anytime, the convenience of smart services, and advances in embedded computing have recently pushed new network developments. Several factors have contributed to this development, e.g., hardware advances (devices are smaller, more powerful, and batteries last longer), the heterogeneity of end-points (a range of devices and “intelligent things”), different architectures (networks of networks, self-configuring, opportunistic and ad-hoc networks), enhancements in technology (mobile, wireless, Bluetooth, RFID, NFC) and the ever more networked society (devices are increasingly affordable and ubiquitous). Such developments have created new network paradigms such as Vehicular Networks, Body Area Networks, Personal Area Networks, Smart Camera Networks, Virtualized Networks, Service-oriented Networks, Home Area Networks, and Named Data Networks.

Novelties in network architectures, technologies and applications raise numerous challenges in terms of risk and trust, and in the trade-off between them. This workshop aims to bring together researchers and practitioners, and foment discussion on risk and trust in emerging networks and how to best defend against their misuse. We encourage different types of contributions – surveys, technical and empirical contributions.

Topics of interest comprise but are not limited to:
Risk assessment
Trust management
Risk modelling, estimation, metrics
Challenges, attacks, and solutions
Novel architectures, topologies and technologies
Results of simulation, and testbed of trust models
New network paradigms and protocols
Trade-off between risk and trust

Important Dates
Submission Deadline April 1, 2015
Author Notification May 11, 2015
Proceedings Version June 8, 2015
Conference August 24-28, 2015

Workshop Chairs
Virginia N. L. Franqueira
University of Derby, UK

Asma Adnane
University of Derby, UK

Program Committee
David Evans, University of Derby, UK
Ashiq Anjum, University of Derby, UK
Shao Ying Zhu, University of Derby, UK
Kim Smith, University of Derby, UK
Abir Awad, IC4, Athlone Institute of Technology, IE
André van Cleeff, CSC, NL
Yijun Yu, Open University, UK
Ricardo Neisse, Joint Research Centre – European Commission, IT
Harjinder Singh Lallie, University of Warwick, UK
Judith Rossebø, ABB, NO
Siv Hilde Houmb, SecureNOK, NO
Lin Liu, Tsinghua University, CN
Roel Wieringa, University of Twente, NL
Ketil Stølen, SINTEF, NO
Thein Thun Tun, Open University, UK
Qiang Guan, USRC – New Mexico Consortium, Los Alamos National Laboratory, US
Sushmita Ruj, Indian Statistical Institute, IN
Ayda Saydane, Revenu Quebec , CA
Sheikh Mahbub Habib, Technische Universitat Darmstadt, DE
Rafael Timóteo de Sousa Júnior, University of Brasilia, BR
Raul H. C. Lopes, CERN-LHC-CMS/GridPP, University of Brunel, UK

The submission guidelines valid for the RT2ND workshop are the same as for the ARES conference. The proceedings of ARES (including workshops) have been published by Conference Publishing Services (CPS) of IEEE. Authors of selected papers that are accepted by and presented at the ARES Conference (including workshops) will be invited to submit an extended version to special issues of international journals.

Related Resources

BioSTAR 2017   Workshop on Bio-inspired Security, Trust, Assurance and Resilience
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
CYBERSUP 2016   Workshop on Cybersecurity Risk and Trust Management across Supply Chains
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
MLDM 2017   Machine Learning and Data Mining in Pattern Recognition
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IJMSA 2016   International Journal of Modelling, Simulation and Applications
PST 2016   14th International Conference on Privacy, Security and Trust
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
TrustCom 2016   The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications