The continuously evolving nature of today’s internet outdates the existing security and safety mechanisms and therefore there is an emerging need to propose robust, powerful and reliable solutions. These advancements have a great impact on the software and system architectures, resulting in a highly dynamic smart networked environment. The systems used within these complex environments have at least two things in common, namely, the need to restrict or grant access for the required resources based on security policy to face security threats, and the need to sustain resilience of the environment in face of safety hazards. Both aspects should consider trust .
Security, safety and trustworthiness on these channels and systems play an important role in this regard. By providing a unified approach that is able to specify and interpret the security policies, relationships and credentials and is able to allow direct authentication for security critical activities. By building trust among different entities involved in the system, the security of the sensitive resources could be ensured more effectively. Similarly, the establishment of different levels of trust within the systems involved in the network can actually improve the security and cooperation among the network entities and can also help in reducing the malicious activities and the safety hazards.
However, as these environments combine systems and applications of different nature, they have different notions for what a resource could possibly be or do, and have different security policies, information assurance needs and safety rules. For example, the network bandwidth could be a resources for a web browser, individual records a resource for a database server, money and accounts resources for a banking application, etc. There is a need to develop a generic security and safety management mechanism that is reliable enough to handle multiple types and numbers of resources for different nature of applications and systems, which the existing mechanisms are unable to handle. These should possibly be developed under a co-engineering approach which considers both security threats and safety hazards.
The goal of SSTM’17 is to attract young researchers, Ph.D. students, practitioners, and industry experts to bring contributions in the area of Security, Safety and Trust Management, especially in the developments of computing, management and programming models, technologies, framework and middleware.
You are invited to submit research papers in the following areas:
Trustworthy applications, including web-based systems
Trusted mobile computing platforms
Trustworthy embedded and Cyber-physical systems, and Internet of Things
User Data Privacy
Active Multimedia Security
Ubiquitous Systems Security
Legal Aspects of Information Security and Assurance
Malware Detection and Analysis
Social Media Security
Open and Distributed Systems Security Mechanisms
Access Control and Authorization
Security in Cloud Computing
Organizational Information Assurance Mechanisms
Secure Software Development
Intrusion detection and resilience leveraging trusted computing
Security policies and management of trusted systems
Safety in IoT and Smart Environments
All submissions must be carefully anonymized for double-blind reviewing. Papers up to six (6) double-column pages (including figures, tables and references) should contain original contributions not published or submitted elsewhere and are to be formatted according to the IEEE template.
Accepted papers will be included in the proceedings published by the IEEE Computer Society Press and will be archived in the IEEE Xplore Digital Library.
06月21日
2017
06月23日
2017
初稿截稿日期
初稿录用通知日期
注册截止日期
留言