posted by organizer: gueneverechen || 5873 views || tracked by 2 users: [display]

SCS&MTR 2018 : HICSS-51-SCS&MTR-2018: Supply Chain Security and Mutual Trust Research Minitrack - HICSS - 51 E-Government Track

FacebookTwitterLinkedInGoogle

Link: http://faculty.washington.edu/jscholl/hicss51/supply-chain.php
 
When Jan 3, 2018 - Jan 6, 2018
Where Big Island, HI, USA
Submission Deadline Jun 15, 2017
Notification Due Aug 16, 2017
Final Version Due Sep 4, 2017
Categories    computer security   information security
 

Call For Papers

==============================================================================
HICSS-51 - SCS&MTR-2018: Supply Chain Security and Mutual Trust Research Minitrack - HICSS - 51 E-Government Track
Hilton Waikoloa Village, Big Island
HI, USA, January 3-6, 2018
==============================================================================

Call for Paper:

The goal of this Supply Chain Security and Mutual Trust Resesarch Minitrack (SCS&MTR-2018) with the the e-Government Track of The Hawaii International Conference on System Sciences (HICSS-51) is to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlines a strategy for mutual trust, cyber security, efficiency, and resilience of our vital global supply chain infrastructure research that is founded on sound principles and technologies.
As our dependence on the cyber infrastructure and their associated supply chains grow ever larger, more complex, and more distributed, the systems that compose them become more prone to failures and/or exploitation. Trusted Supply Chains values currency and relevance over detail and accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of “our” society. The combination of increased vulnerability, increased stakes and increased threats make supply chains and their associated processes one of the most important emerging challenges in the evolution of modern cyberspace “mechanization.”

-----------------------------
Submission Guidelines
-----------------------------
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories, listed in the Topics section are welcome, but not necessarily limited to that list. The papers should emphasize advances in research and development activities. Papers may be theoretical, conceptual, tutorial, or descriptive in nature. Submission guidelines should follow instructions for authors located at the HICSS-51 website.

-----------------------------
List of Topics
-----------------------------
• Promote the secure and efficient movement of goods by
-resolving threats early,
-improving verification and detection capabilities,
-enhancing security of infrastructure and conveyances in order to protect the supply chain, and
-maximizing the flow of legitimate trade.
• Foster a resilient supply chain by
-mitigating systemic vulnerability of supply chains and
-promoting trade resumption policies and practices.
• How can stakeholders provide assurance that my product is safe without revealing intellectual property (e.g., source code)?
• Is there a formal certification process and authority that can certify certain security properties exist in the product?
• What would constitute a trusted third party (TTP) certification body (e.g., charter, COI, goals, membership, participants, industry)?
• What would be the focus and benefits of the TTP (incentives, methods, technologies) and key outcomes (especially sponsors)?
• How would the TTP get industry buy-in and be distinguished from other (e.g., TCB, OWASP, etc.) existing bodies?
• Better precision in understanding existing and emerging vulnerabilities and threats.
• Advances in insider threat detection, deterrence, mitigation and elimination.
• Assuring security, survivability and dependability of our critical infrastructures.
• Assuring the availability of time-critical scalable secure systems, information provenance and security with privacy.
• Observable/ measurable/certifiable security claims, rather than hypothesized causes.
• Methods that enable us to specify security requirements, formulate security claims, and certify security properties.
• Assurance against known and unknown (though perhaps pre-modeled) threats.
• Mission fulfillment, whether or not security violations have taken place (rather than chasing all violations indiscriminately).

-----------------------------
Committees
-----------------------------
• Guenevere (Qian) Chen - Savannah State University, gueneverechen@gmail.com
• Frederick (Rick) T. Sheldon - University of Idaho, sheldon@idaho.edu
• Robert (Bob) K. Abercrombie - University of Memphis and Prime Time Computing, LLC, abercrombier@ieee.org

-----------------------------
Publication
-----------------------------
HICSS-51 - SCS&MTR-2018 proceedings will be published in ScholarSpace (the institutional repository for the University of Hawai'i at Manoa and is maintained by Hamilton Library and built on open-source DSpace software.

-----------------------------
Contact
-----------------------------
All questions about submissions should be emailed to:
Guenevere (Qian) Chen (Primary Contact) - gueneverechen@gmail.com
Frederick (Rick) T. Sheldon - sheldon@idaho.edu or
Robert (Bob) K. Abercrombie - abercrombier@ieee.org

Related Resources

IJCIS 2026   International Journal on Cryptography and Information Security
IJMVSC 2026   The International Journal of Managing Value and Supply Chains
IJSPTM 2026   International Journal of Security, Privacy and Trust Management
ICCSIT 2026   ACM--2026 The 19th International Conference on Computer Science and Information Technology (ICCSIT 2026)
BDBS 2026   7th International Conference on Big Data, Blockchain and Security
IJNSA 2026   International Journal of Network Security & Its Applications - ERA Indexed, H Index - 52
ICCGV 2026   SPIE--2026 9th International Conference on Computer Graphics and Virtuality (ICCGV 2026)
JITST 2026   Journal of Internet Technology and Secured Transactions
ICIVP 2026   2026 2nd International Conference on Image and Video Processing (ICIVP 2026)
IOTBS 2026   6th International Conference on IOT, Big Data and Security