-------- Original-Nachricht --------
Betreff: [computational.science] CFP: 1st Workshop on the Security of the Internet of Things (SecIoT'10)
Datum: Mon, 02 Aug 2010 16:45:30 +0200
Von: Rodrigo Roman <roman@lcc.uma.es>
Organisation: "ICCSA"
An: Computational Science Mailing List <computational.science@lists.iccsa.org>


(Apologies for cross-postings)

-------------------------------------------------------------------------
 The 1st Workshop on the Security of the Internet of Things
 (SecIoT 2010)
 Tokyo (Japan), November 29, 2010
http://www.isac.uma.es/seciot10
 in conjunction with
 Internet Of Things 2010, November 29 - December 1, 2010
-------------------------------------------------------------------------

Important Dates:
----------------

Paper Submission due: 10 September 2010
Acceptance notification: 5 October 2010
Final papers due: 12 October 2010

Overview/Scope:
---------------

While there are many definitions of the Internet of Things (IoT), all of 
them revolve around the same central concept: a world-wide network of 
interconnected objects. These objets will make use of multiple 
technological building blocks, such as wireless communication, sensors, 
actuators, and RFID, in order to allow people and things to be connected 
anytime anyplace, with anything and anyone. However, before this new 
vision takes its first steps, it is essential to consider the security 
implications of billions of intelligent things cooperating with other 
real and virtual entities over the Internet. In fact, we need to plan 
well in advance what kind of technological mechanisms, protocols and 
standard infrastructures we will need in order to protect the IoT. 
Failure to do so will result in a weak infrastructure, which will be 
surely exploited by malicious entities performing attacks such as 
accessing personal information or manipulating the elements of the real 
world. The setback caused by the lack of trust on the IoT can be 
disastrous for the realization of this vision.

Securing the IoT is a very complex task, because there are plenty of 
factors that must be taken into account. Not only it is necessary to 
protect its different building blocks, but it is also vital to consider 
how these blocks will work together and what kind of interoperable 
security mechanisms must be created. Besides, there will be multiple 
actors, such as human beings, machines, and the very own objects, that 
will use the services provided by the IoT, and it is necessary to assure 
a certain level of security during their cooperation. Moreover, the 
management of all the information produced by these interactions raises 
many security concerns, such as privacy issues, that must be addressed 
and solved. Therefore, the goal of this workshop is to bring together 
researchers and industry experts in areas relevant to the security  of 
the Internet of Things. As this workshop is the first in this area, it 
is also its objective to serve as a forum for not only presenting 
state-of-the-art research, but also for debating the role of security 
and its practical implications in the development of the IoT.

Topics of interest for the workshop include the following:
----------------------------------------------------------

 * New security problems in the context of the IoT.
 * Privacy risks and data management problems.
 * Identifying, authenticating, and authorizing entities.
 * Development of trust frameworks for secure collaboration.
 * New cryptographic primitives for constrained "things".
 * Connecting heterogeneous ecosystems and technologies.
 * Legal Challenges and Governance Issues.
 * Resilience to external and internal attacks.
 * Context-Aware Security.
 * Providing protection to an IP-connected IoT.
 * Web services security and other application-layer issues.

Submission Guidelines:
----------------------

Submitted papers must not substantially overlap papers that have been 
published or that are simultaneously submitted to a journal or a 
conference with proceedings. Submission of a paper should be regarded as 
an undertaking that, should the paper be accepted, at least one of the 
authors will register for the conference and present the work. All 
accepted workshop papers will be published in a single workshop 
proceedings volume.

Papers must be submitted using the workshop web site and following the 
requirements stated there. All Paper submissions should be anonymized to 
facilitate blind review. Submission should be in IEEE 8.5x11 conference 
format and should not exceed 8 pages. Submission should be formatted in 
strict accordance with the IEEE Computer Society author guidelines: 
http://www.ieee.org/web/publications/pubservices/confpub/AuthorTools/conferenceTemplates.html 


Authors of selected papers will be invited to submit an extended version 
for possible publication in the "Protecting the Internet of Things" 
special issue of Wiley's Security and Communication Networks Journal. 
This journal is indexed in almost all important technical journal index 
systems, such as ISI, SCI, EI, SCOPUS, etc.

Committees
----------
General Co-Chairs:
 - Jim Clarke (Waterford Institute of Technology, Ireland)
 - Rodrigo Roman (University of Malaga, Spain)

Program Co-Chairs:
 - Stefanos Gritzalis (University of the Aegean, Greece)
 - Jianying Zhou (Institute for Infocomm Research, Singapore)

Program Committee (Tentative - PC are being invited):
 - Alessandro Acquisti (Carnegie Mellon University, USA)
 - Levente Buttyan (BME, Hungary)
 - Barbara Daskala (ENISA, Greece)
 - John Dominque (Knowledge Media Institute, The Open University, UK)
 - Alex Gluhak (University of Surrey, UK)
 - Antonio Jara (University of Murcia, Spain)
 - Marc Joye (Technicolor, France)
 - Jin Kwak (Soonchunhyang University, Korea)
 - Andre Koenig (Technische Universität Darmstadt, Germany)
 - Manik Lal Das (Dhirubhai Ambani Inst. for Information and 
Communication Tech., India)
 - Costas Lambrinoudakis (University of Piraeus, Greece)
 - Albert Levi (Sabanci University, Turkey)
 - Javier Lopez (University of Malaga, Spain)
 - Christoph P. Mayer (University of Karlsruhe, Germany)
 - Yi Mu (University of Wollongong, Australia)
 - Barry Mulcahy (Waterford Institute of Technology, Ireland)
 - Aljosa Pasic (Atos Origin, Spain)
 - Michel Riguidel (Institut Télécom/Télécom ParisTech, France)
 - Panagiotis Rizomiliotis (University of the Aegean, Greece)
 - Matt Robshaw (Orange Labs, France)
 - Gokay Saldamli (Bogazici University, Turkey)
 - Neeraj Suri (Technische Universitaet Darmstadt, Germany)
 - Rolf H. Weber (University of Zurich, Switzerland)
 - Duncan Wong (City University of Hong Kong, China)
 - Yanjiang Yang (Institute for Infocomm Research, Singapore)
 - Yunlei Zhao (Fudan University, China)
 - Wen Tao Zhu (CAS, China)

---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe@lists.iccsa.org
For additional commands, e-mail: computational.science-help@lists.iccsa.org