Workshop on Security and Privacy in Systems and Communication Networks

(SecureSysComm 2015)

 


November 4-6, 2015, Krakow Poland


In conjunction with the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3GPCIC)

 
 

Important Dates

Submission: July 31, 2015
Notification: Augu. 12, 2015
Final version: Sept. 6, 2015
Registration: Sept. 11, 2015


PuBBlication

Proceedings of SecureSysComm-2015 workshop will be published by IEEE CPS.


Accepted papers will be invited to submit an extended version to Elsevier Book Series: "Intelligent Data-Centric Systems".


The best papers will be considered for publication in a Special Issue of Journal of High Speed Networks.


 

Workshop Chairs



Program CommitTee

Andrei Lobov: Tampere University of Technology, Finland

Aniello Castiglione: University of Salerno, Italy

Victor Muntés Mulero: CA Technologies Development, Spain

Massimiliano Rak: Second University of Naples, Italy

Eider Iturbe: Tecnalia Research & Innovation, Spain

Ilsun You: Korean Bible University, Korea

Ugo Fiore: University of Naples, Italy

Rios Velasco Erkuden: Tecnalia Research & Innovation, Spain

Salvatore Distefano: Politecnico di Milano, Italy

Sergio Ricciardi: Universitat Politecnica de Catalunya, Spain


 

CONTACTS

E-mail:massimo.ficcoATunina2.it

fpalmieriATunisa.it





 
 

Modern society witnesses a growing pervasiveness of sophisticated computer-based systems and increasingly performance communication networks, whose influence in daily life is huge. Complexity, heterogeneity, scale and interdependence shown by such systems are source of potential vulnerabilities and threats.

The Workshop seeks submissions from academia and industry presenting novel research on theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

The Workshop topics include (but are not limited to) the following:

  1. - Inspection and forensics technologies

  2. - Threat and vulnerability identification and modelling

  3. - Wireless communications security

  4. - Network-centric systems and dependability

  5. - Information security, encryption, privacy

  6. - Access control and identity management

  7. - Security and privacy protection mechanisms

  8. - Cyber-physical threats, vulnerability analysis, and countermeasures

  9. - Biometrics security and privacy

  10. - Critical infrastructure protection

  11. - Formal methods for security

  12. - Human factors and human behaviour recognition techniques

  13. - Identification, authentication and non-repudiation

  14. - Security and privacy in pervasive/ubiquitous computing

  15. - Security and privacy in smart grids

  16. - Security and privacy in social networks

  17. - Security and privacy in the cloud

  18. - SLA security in the cloud

  19. - Security weaknesses and protection of energy-control facilities

  20. - Energy consumption attacks

Aims, Scope and Topics

 
Â