WCN 2011 - Network Assurance and Security Services in Ubiquitous Environments
View: 1065
Website www.hindawi.com |
Edit Freely
Category WCN 2011
Deadline: December 15, 2010 | Date: June 15, 2011
Venue/Country: Call for papers, Ireland
Updated: 2010-08-20 23:20:40 (GMT+9)
Call For Papers - CFP
The technology for ubiquitous computing system is advancing rapidly; however, the technology for ensuring security and availability has not kept pace. Since security has not been considered as an essential element in the design process and is often added as an afterthought, many modern systems are often plagued with numerous vulnerabilities. Thus, to have secure and resilient ubiquitous systems, essential network assurance and security (NAS) measures have to be incorporated in the design process and during their operation.Network assurance (NA) quantifies risk from a network perspective, based on a comprehensive set of network facts. A complement to security solutions, network assurance measures the impact of network change on security, availability, and compliance. Using NA, organization can also prioritize remediation efforts based on a complete view of connectivity and risk. This is a critical requirement for validating policies and controls, as organizations weave security into the fabric of the infrastructure. Consequently, NAS has become an important research issue in ubiquitous environments (UEs). Finding effective ways to protect networks and sensitive data within the critical information infrastructure in UE is challenging even with the most advanced technology and trained professionals.1687-1472The aim of this special issue is to provide an effective forum for original scientific and engineering advances in NAS issues in UE. It will highlight various aspects of NAS?especially on crucial linkage between availability, compliance, and security. This issue will bring out the latest development and recent research results in this important technical area as well as problems and solutions related to NAS issues in UE. Topics include, but are not limited to:Design, architectures, protocols, development, and deployment of NASAvailability, dependability, survivability, and resilience issuesAuthentication, Authorization, Access control and ID managementRedundancy, fault-tolerant models, and failure preventionTrust modeling and managementRisk assessment and managementCryptographic, network security and key managementNovel threats, attacks, vulnerabilities, and countermeasuresReverse engineering of malicious codeIntrusion detection, IDS/IPSAnonymity, user, and location privacyContent protection and DRMSystem/network managementNetwork forensics and fraud detectionSurveillance and privacy-enhancing technologiesAdaptive and Autonomic securityMultimedia security and privacyLegal, ethical and policy issues related to NASNew ideas and paradigms for NASBefore submission authors should carefully read over the journal's Author Guidelines, which are located at http://www.hindawi.com/journals/wcn/guidelines.html
. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/
according to the following timetable:Manuscript Due December 15, 2010First Round of Reviews March 15, 2011Publication Date June 15, 2011
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.