posted by organizer: moi || 1967 views || tracked by 1 users: [display]

INTRICATE-SEC 2018 : Workshop on Security and Privacy Intricacies in Resource Constrained Computing Environments (INTRICATE-SEC 2018), Krakow, Poland (May 16-18, 2018)

FacebookTwitterLinkedInGoogle

Link: http://mykayem.org/IntricateSec2018.html#portfolio
 
When May 16, 2018 - May 18, 2018
Where Krakow, Poland
Abstract Registration Due Dec 3, 2017
Submission Deadline Dec 15, 2017
Notification Due Jan 25, 2018
Final Version Due Feb 16, 2018
Categories    resource constrained computing   security   privacy   human factors
 

Call For Papers

This edition of Intricate-Sec is centered on Resource Constrained Computing and will be held in conjunction with the 32nd IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA-2018). Computing under resource constraints is a relatively new field in computer science, in which we seek to develop solutions that are viable in terms of performance. Application examples emerge in rural/remote developing world regions where access to computational resources and in-house human capital (in terms of specialised expertise) is impeded for economic reasons. In such cases, it makes sense to seek cost-effective alternatives to deploying Internet services. Typical solution models rely on mobile phones, and lossy communication networks as a cost effective approach to service delivery. Using a trusted centralised framework for service delivery is not always feasible in these cases, and so distributed management offers a viable alternative. Distributed management however, raises concerns centered around subversion whereby in contrast to standard adversarial models, the malicious party seeks to mask attacks as faults with the goal of gaining some advantage without necessarily provoking a breakdown of the communication network. While seemingly harmless on initial level, when conducted over an extended period and by multiple parties, such attacks can result in unreliable and untrustworthy performance.

Related Resources

blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
IJACEEE 2021   International Journal of Applied Control, Electrical and Electronics Engineering
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
IoTSP 2021   Internet of Things Security and Privacy: Practical and Management Perspectives
IJMIT 2021   International Journal of Managing Information Technology
IEEE CSP--EI, Scopus 2022   2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)--EI Compendex, Scopus
IEEE Network 2021   IEEE Network Magazine Special Issue Call for Paper: Trust, Security and Privacy of 6G