| |||||||||||||||||
INTRICATE-SEC 2017 : 5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services (INTRICATE-SEC 2017) | |||||||||||||||||
Link: http://mykayem.org/IS/submission.html | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Cyber-physical systems (CPS) are ubiquitous in critical infrastructures such as electrical power generation, transmission, and distribution networks, water management, and transportation, but also in both industrial and home automation. For flexibility, convenience, and efficiency, CPS are increasingly supported by commodity hardware and software components that are deliberately interconnected using open standard general purpose information and communication technology (ICT).
The long life-cycles of CPS and increasingly incremental changes to these systems require novel approaches to the composition and inter-operability of services provided. The paradigm of service-oriented architectures (SoA) has successfully been used in similar long-lived and heterogeneous software systems. However, adapting the SoA paradigm to the CPS domain requires maintaining the security, reliability and privacy properties not only of the individual components but also, for complex interactions and service orchestrations that may not even exist during the initial design and deployment of an architecture. An important consideration therefore is the design and analysis of security mechanisms and architectures able to handle cross domain inter-operability over multiple domains involving components with highly heterogeneous capabilities. The INTRICATE-SEC workshop aims to provide a platform for academics, industry, and government professionals to communicate and exchange ideas on provisioning secure CPS and Services. We seek contributions focused on (but not limited to) the following topics: Anonymity and Pseudonymity Trust and Identity Management Authentication and Authorization Access Control Models Key Management, Applied Cryptographic Protocols/Schemes Privacy Malware Detection Phishing and Spam Trust and Identity Management Demand Management Scheduling Energy Management and Marketing Models Cloud Security Attack Models Scalability, Reliability and Safety Intrusion Detection and Response Legal and Regulatory Issues Vulnerability Analysis and Countermeasures Web Applications and Services Unconventional or Biologically Inspired Security Approaches Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings. Duplications or overlap with other published or submitted papers will be considered as grounds for rejection. Papers should be submitted in Portable Document Format (PDF) only, edited using the two-column CPS Proceedings style, and may not be longer than 6 pages (including references and appendices). Templates are available at the IEEE authors' portal. All submissions must be made on the Easychair site. Accepted papers will appear in the INTRICATE-SEC proceedings published by IEEE Conference Publishing Services (CPS). At least one author of each accepted paper must register and attend the INTRICATE-SEC 2017 workshop in person to present the paper. Authors of selected papers presented at the workshop will be invited to submit extended versions of their papers for publication in a Springer Book published as part of the "Advances in Information Security" series. The submitted extended versions will undergo a further review process. |
|