posted by organizer: akayem || 21621 views || tracked by 10 users: [display]

INTRICATE-SEC 2017 : 5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services (INTRICATE-SEC 2017)


When Mar 27, 2017 - Mar 29, 2017
Where Taipei, Taiwan
Abstract Registration Due Oct 31, 2016
Submission Deadline Nov 15, 2016
Notification Due Dec 20, 2016
Final Version Due Jan 20, 2017
Categories    security   privacy   services   cyber-physical systems

Call For Papers

Cyber-physical systems (CPS) are ubiquitous in critical infrastructures such as electrical power generation, transmission, and distribution networks, water management, and transportation, but also in both industrial and home automation. For flexibility, convenience, and efficiency, CPS are increasingly supported by commodity hardware and software components that are deliberately interconnected using open standard general purpose information and communication technology (ICT).

The long life-cycles of CPS and increasingly incremental changes to these systems require novel approaches to the composition and inter-operability of services provided. The paradigm of service-oriented architectures (SoA) has successfully been used in similar long-lived and heterogeneous software systems. However, adapting the SoA paradigm to the CPS domain requires maintaining the security, reliability and privacy properties not only of the individual components but also, for complex interactions and service orchestrations that may not even exist during the initial design and deployment of an architecture.

An important consideration therefore is the design and analysis of security mechanisms and architectures able to handle cross domain inter-operability over multiple domains involving components with highly heterogeneous capabilities. The INTRICATE-SEC workshop aims to provide a platform for academics, industry, and government professionals to communicate and exchange ideas on provisioning secure CPS and Services.

We seek contributions focused on (but not limited to) the following topics:

Anonymity and Pseudonymity
Trust and Identity Management
Authentication and Authorization
Access Control Models
Key Management, Applied Cryptographic Protocols/Schemes
Malware Detection
Phishing and Spam
Trust and Identity Management
Demand Management
Energy Management and Marketing Models
Cloud Security
Attack Models
Scalability, Reliability and Safety
Intrusion Detection and Response
Legal and Regulatory Issues
Vulnerability Analysis and Countermeasures
Web Applications and Services
Unconventional or Biologically Inspired Security Approaches

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings. Duplications or overlap with other published or submitted papers will be considered as grounds for rejection.

Papers should be submitted in Portable Document Format (PDF) only, edited using the two-column CPS Proceedings style, and may not be longer than 6 pages (including references and appendices).

Templates are available at the IEEE authors' portal. All submissions must be made on the Easychair site. Accepted papers will appear in the INTRICATE-SEC proceedings published by IEEE Conference Publishing Services (CPS). At least one author of each accepted paper must register and attend the INTRICATE-SEC 2017 workshop in person to present the paper.

Authors of selected papers presented at the workshop will be invited to submit extended versions of their papers for publication in a Springer Book published as part of the "Advances in Information Security" series. The submitted extended versions will undergo a further review process.

Related Resources

CYBER 2018   The Third International Conference on Cyber-Technologies and Cyber-Systems
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
INTRICATE-SEC 2018   Workshop on Security and Privacy Intricacies in Resource Constrained Computing Environments (INTRICATE-SEC 2018), Krakow, Poland (May 16-18, 2018)
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
RMfSIS 2018   Special Issue on Risk Management for Software Intensive Systems - Systems Journal
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
ACII 2018   Advanced Computational Intelligence: An International Journal
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems
SECITC 2018   11th International Conference on Security for Information Technology and Communications