SETOP 2011 - 4th SETOP International Workshop on Autonomous and Spontaneous Security
View: 824
Website |
Edit Freely
Category SETOP 2011
Deadline: June 10, 2011 | Date: September 15, 2011-September 16, 2011
Venue/Country: Leuven, Belgium
Updated: 2011-04-05 15:10:25 (GMT+9)
Call For Papers - CFP
Security and reliability have become a major concern for service oriented applications as well as for communications systems and networks. With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this context, security is an essential property. It must be thought at the early stage of conception of these systems and designed to be also autonomous and spontaneous.Future networks and systems must be able to automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. Those networks and systems should interoperate securely when their respective security policies are heterogeneous and possibly conflicting. They must be able to autonomously evaluate the impact of an intrusion in order to spontaneously select the appropriate and relevant response when a given intrusion is detected. Autonomous and spontaneous security is a major requirement of future networks and systems. Of course, it is crucial to address this issue in different wireless and mobile technologies available today such as RFID, Wifi, Wimax, 3G, etc. Other technologies such as ad hoc and sensor networks, which introduce new type of services, also share similar requirements for an autonomous and spontaneous management of security.TopicsThe SETOP Workshop seeks submissions that present research results on all aspects related to spontaneous and autonomous security. Submissions by PhD students are encouraged. Topics of interest include, but are not limited to the following:http://setop2011.dyndns.org/cfp.htmlSecurity policy deploymentSelf evaluation of risk and impactDistributed intrusion detectionAutonomous and spontaneous responseTrust establishmentLightweight cryptographySelfish behaviour and collaboration enforcementSecurity in autonomous networksSecurity in ad hoc networksSecurity in sensor/RFID networksSecurity of Next Generation NetworksSecurity in Cloud ComputingSecurity of Service Oriented ArchitectureSecurity of opportunistic networksPrivacy in self-organized networksSecure localizationContext aware and ubiquitous computingSecure interoperability and negotiationSelf-organization in secure routingIdentity managementModelling and validation of securitySubmission guidelinesPapers should be at most 15 pages (using 11-point font), excluding the bibliography and well-marked appendices. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English.Authors must submit their papers by the deadline indicated below, using the EasyChair web site and following the requirements stated there.All papers will be refereed. Accepted papers should be presented at the Workshop. At least one author of each accepted paper must register to the workshop, by the early date indicated by the organizers, and present the paper.Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.