posted by organizer: abbashaider || 859 views || tracked by 1 users: [display]

SSTM 2017 : Security, Safety and Trust Management (SSTM) Track @ The 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).


When Jun 21, 2017 - Jun 23, 2017
Where Pozna, Poland
Submission Deadline Feb 26, 2017
Notification Due Apr 2, 2017
Final Version Due Apr 15, 2017
Categories    security & privacy   trust management   information assurance

Call For Papers

Call for papers
The evolving nature of today internet continuously outdates the existing security and safety mechanisms. As these heterogeneous environments combine different technologies - systems and applications - they have different understanding for what a resource could possibly be or do, and have different security policies, information assurance needs and safety rules. Therefore, there is an emerging need to propose robust, powerful and reliable solutions. These advancements have a great impact on the software and system’s architectures, resulting in a highly dynamic smart networked environment. Independent of the providers, all the systems share the need to restrict or grant access for the required resources based on security policy to cope with security threats, and the need to sustain resilience of the environment in face of safety hazards. For security and safety, trust and trust management act as powerful lubricants.
The SSTM track deals with providing state-of-art security policies, relationships and credentials aiming to allow direct authentication for security critical activities. By reinforcing trust across the different components of a system, security of the sensitive resources could be ensured more effectively. Similarly, the establishment of different levels of trust within the systems involved in the network can actually improve the security and cooperation among the network entities. It can also help in reducing the malicious activities and the safety hazards.

SSTM seeks for paper submissions in a wide range of security safety trust management related topics including but not limited to the following:
Ø Trustworthy applications, including web-based systems
Ø Trusted mobile computing platforms
Ø Trustworthy embedded and Cyber-physical systems, and Internet of Things
Ø User Data Privacy
Ø Active Multimedia Security
Ø Ubiquitous Systems Security
Ø Legal Aspects of Information Security and Assurance
Ø Malware Detection and Analysis
Ø Social Media Security
Ø Open and Distributed Systems Security Mechanisms
Ø Access Control and Authorization
Ø Security in Cloud Computing
Ø Organizational Information Assurance Mechanisms
Ø Secure Software Development
Ø Intrusion detection and resilience leveraging trusted computing
Ø Security policies and management of trusted systems
Ø Safety in IoT and Smart Environments

Publication: Accepted papers will be included in the proceedings published by the IEEE Computer Society Press and will be archived in the IEEE Xplore Digital Library.

Important Dates
Full paper submission deadline: February 26th, 2017
Notification of acceptance: April 2nd, 2017
Camera-ready papers deadline: April 15th, 2017
WETICE_2017 Conference: June 21-23, 2017

Authors are invited to submit full papers limited to 6 pages or short papers limited to 4 pages of double column text including tables and references, formatted using the IEEE Proceeding template.
The TRUST submission system (EasyChair) is available here:

Organizing Committee

Track Chairs

Haider Abbas, Center of Excellence in Information Assurance, King Saud University, KSA
Eugenio Orlandi, Independent Security Consultant, The Hagues, Netherlands

Program Committee Chairs

Farrukh Aslam Khan, King Saud University, KSA
Oliver Popov, Stockholm University, Sweden
Asif Masood, National University of Sciences & Technology, Pakistan


William Allen, Florida Institute of Technology, USA
Fredrik Björck, Stockholm University, Sweden
Mahsa Teimourikia, DEIB, Politecnico di Milano, Italy
Christer Magnusson, Royal Institute of Technology, Sweden
Imran Rashid, National University of Sciences & Technology, Pakistan
Nima Khakzad Rostami, Delft University of Technology, Netherlands
Enrico Zio, Politecnico di Milano, Italy
Hayretdin Bahsi, Tallinn University of Technology, Estonia
Francesco Di Maio, Politecnico di Milano, Italy
Nicola Pedroni, Université Paris-Saclay, France
Kashif Saleem, King Saud University, KSA
Giovanni Sansavini, Institute of Energy Technology, ETH Zurich, Switzerland
Erisa Khalifi, Imperial College London, UK
Anam Sajid,Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Pakistan
François Charoy, University of Lorraine, France
Hiroki Suguri, Miyagi University, Japan
Sule Yildirim-Yayilgan, Norwegian University of Science and Technology, Norway
Yin Zhang, Zhongnan University of Economics and Law, China
Dhiah el Diehn I. Abou-Tair, German Jordanian University, Jordan
Asad Raza, Abu Dhabi Polytechnic Institute of Applied Technology , UAE
Duminda Wijesekera, George Mason University, USA

Related Resources

ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IJIBM 2019   Call For Papers - International Journal of Information, Business and Management
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)
(RMEG-March-2019) 2019   2nd International Forum on Recent Advances in Management, E Commerce, Global Economy and Social Sciences (RMEG-March-2019) Tokyo, Japan
MDPI Information 2019   MDPI OA Journal of Information Science, Technology and Engineering --SI on Machine Learning for Cyber-Security
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
IEEE S&P 2019   IEEE Symposium on Security and Privacy
DSN 2019   Dependable Systems and Networks