Our Sponsors
Website http://iwssi2009.cs.univie.ac.at/doku.php |
Edit Freely
Category IWSSI/SPMU 2009
Deadline: February 10, 2009 | Date: May 11, 2009
Venue/Country: Nara, Japan
Updated: 2010-06-04 19:32:22 (GMT+9)
) was highly successful in bringing together a research community working on se- curity for spontaneous interaction (which resulted in a special issue of IJSN, the International Journal on Security and Networks, presenting the most important approaches), and SPMU 2008 (http://www.vs.inf.ethz.ch/events/spmu08/
) showed the need for a specific workshop on security and privacy research for mobile devices (with the result of a collaboratively assembled list of open research questions).This workshop aims to bring together researchers working on these topics, to define open issues, clarify the used terminology, and foster cooperation between researchers in this area. One of the main issues is still the lack of common ground, although common protocol families have started to appear since IWSSI 2007. This includes both terminology and a shared understanding of the open research issues covering various aspects like user interaction, cryptographic primitives, and dealing with limited device resources, as well as legal, social, and cultural implications of increased mobile phone use for security- and privacy-relevant interactions. One specific focus question is how mobile devices in general (and mobile phones in particular) can assist their users in interacting with an increasingly pervasive environment of networked services ¨C securely, protecting the users¡¯ privacy, and usable to non-experts.That is, how can mobile devices act as a trustworthy interface to the digital world?The workshop will provide a forum for researchers to discuss these problem areas and to put forward an agenda for future research. An expected outcome of the workshop is increased cooperation between research groups and a special issue in a renowned international journal. As for IWSSI 2007, we plan to in- vite authors of other groundbraking papers to contribute to the special issue in addition to the best workshop papers.Topics of InterestSpecific topics of interest for this workshop include, but are not limited to, the following items as they appear in the context of spontaneous interaction and/or mobile device use:Authentication protocols and methods for device pairing or user authenticationSensor-, context-, and location-based authentication methodsAuthorization, access control, and trust managementLogging and auditing of spontaneous interactions with mobile devicesNetwork and system modelsSecurity and privacy of mobile phone usersSecurity and privacy issues in mobile phone networksPrivacy and anonymous/pseudonymous interactionsUser interfaces and models for user interaction on mobile devicesMaking use of spontaneous interaction in applicationsPublic perception of security and privacy issues of mobile phonesLegal and social issues of security and privacy for mobile phonesOptions for lawful, auditable, and restricted tracking and surveillance using mobile phones in law enforcementKeywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.