posted by user: tell || 5316 views || tracked by 4 users: [display]

PMC-CUC 2016 : Cybersecurity for Ubiquitous Cities -- Pervasive and Mobile Computing


When N/A
Where N/A
Submission Deadline Jul 15, 2016
Notification Due Sep 15, 2016
Categories    security

Call For Papers

Cybersecurity for Ubiquitous Cities

A Ubiquitous City (U-city) is a new concept to integrate information and communication technologies (ICT) into urban areas using ubiquitous computing technologies. These technologies can strongly improve the quality of life in the 21st century, as the world’s population is becoming more and more urban. Relevant applications of ubiquitous ICT technologies include management of traffic, waste, electricity, sewage, air pollution and water quality, monitoring fire and crime, conserving renewable resources, coordinating urban policies and programs for urban planners etc. A U-city can be seen as a fusion of information systems and social systems. Within this paradigm, every device and service is linked to an information network through wireless networking and RFID tags and sensors. Any wearable device such as a smart phone, a smart watch or smart glasses can also be a ubiquitous point to collect data and get information from a central administrator. Thus the concept of U-city provides a two-way communication platform between citizens and government anytime anywhere and for any services. However, despite the huge advantages of U-cities, serious stability and reliability problems can occur if security is not considered in the design and development of new ICT ubiquitous services to be integrated into U-city projects. For example, a ubiquitous service or network can be corrupted and fall under the control of malicious agents. Also, sensitive data can be captured by hackers. Such circumstances result into serious disruption. On the other side, privacy is another issue that has to be addressed by design. No one wants to be traced for his daily activity or personal habits. Since ubiquitous devices are pervasive, location privacy becomes especially important. This special issue intends to gather cutting-edge results on cybersecurity issues in the flourishing domain of ubiquitous cities.

The aim of the proposed Special Issue is to promote research and reflect the most recent advances of technologies in cybersecurity of ubiquitous cities, with emphasis on the following aspects, but certainly without limitation to them:

The list of topics includes, but is not limited to:

- Access control in U-cities

- Authentication in U-cities

- Anti-social event detection in U-cities assisted by big data analysis

- Cloud-assisted secure applications for U-cities

- Key management in U-cities

- Lightweight security for wearable devices in U-cities

- Location and trajectory privacy for mobile devices in U-cities

- Multimedia security and privacy in U-cities

- New business processes and models involving cybersecurity in U-cities

- Physical security threats and solutions to endpoints in U-cities

- Privacy Enhanced Technologies (PET) for U-cities

- Privacy preserving data collection and disclosure in U-cities

- Security and citizen privacy-related legal issues in U-cities

- Security and privacy for electronic healthcare in U-cities

- Security and privacy for integrated design and development of U-cities

- Secure and privacy-preserving information exchange for intelligent transportation in U-cities

- Secure and privacy-preserving surveillance in U-cities

- Secure big data analysis for U-cities

- System model and architecture for security and privacy enabled U-cities

- Secure outsourcing for pervasive devices in U-cities

Note that papers whose main contribution is of cryptographic nature may not be appropriated for this special issue.

Important Dates

Submission deadline: July 15, 2016

Initial feedback to authors: September 15, 2106

Final notification: December 10, 2016

Expected Publication of the Special Issue: 2017

Submission Guidelines

All submissions have to be prepared according to the Guide for Authors as published in the Journal website at Authors should select “SI: Cybersecure UCity”, from the “Choose Article Type” pull-down menu during the submission process. All contributions must not have been previously published or be under consideration for publication elsewhere. A submission based on one or more papers that appeared elsewhere (including those invitations from Special Issue submission of ACISP 2016) has to comprise major value-added extensions over what appeared previously (at least 30% new material). Authors are requested to attach to the submitted paper their relevant, previously published articles and a summary document explaining the enhancements made in the journal version.

Guest Editors of the Special Issue:

- Joseph Liu, Monash University, Australia

- Urs Hengartner, University of Waterloo, Canada

- Xinyi Huang, Fujian Normal University, China

Related Resources

PerFoT 2019   2019 International Workshop on Pervasive Flow of Things (Co-located with IEEE PerCom 2019)
ESORICS 2019   The 24th European Symposium on Research in Computer Security
PMC Blockchain 2019   Pervasive and Mobile Computing: Special issue on Blockchain Technology and Applications
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
WiMob 2019   15th International Conference on Wireless and Mobile Computing, Networking and Communications
CLOUD 2019   8th International Conference on Cloud Computing: Services and Architecture
MobiWis 2019   The 16th International Conference on Mobile Web and Intelligent Information Systems
ISSRE 2019   The 30th International Symposium on Software Reliability Engineering (ISSRE) - IEEE
PerCrowd 2019   2nd International Workshop on Context-Awareness for Multi-Device Pervasive and Mobile Computing (co-located with IEEE PerCom 2019)
BIOE 2019   International Conference on Bioscience & Engineering