Security,
Privacy,
and Trust
for Pervasive
Applications
(SPTPA 2006)
|
|
Security, Privacy, and Trust for Pervasive Applications
(SPTPA 2006)
ADVANCED PROGRAM
Advanced Program
for SPTPA (pdf)
MOTIVATION
Pervasive computing has progressed significantly during
this decade due to the developments and advances in portable low-cost
light-weight devices and emergent short range, and low-power wireless
communication networks. Pervasive computing focuses on combining computing
and communications with the surrounding physical environment and make
computing and communication transparent to the users in day to day
activities. In pervasive computing, numerous, casually accessible,
often invisible, frequently mobile or embedded devices form an ad
hoc network, which sometimes connects to fixed networks structure
too. These pervasive computing devices often collect information about
the surrounding environment using on board location and other sensors.
Pervasive computing has the inherent disadvantages of slow expensive
connections, frequent line disconnection, limited host bandwidth,
location dependent data, etc. These challenges make the pervasive
computing applications even more vulnerable. Traditional security
measures do not fit well in pervasive computing. Since location and
contexts are key attributes of pervasive computing applications, the
privacy issues need to be handled in a different way than traditional
computing. The devices leave and join in an ad hoc manner in the pervasive
network. These create a need for new trust models for pervasive computing
applications. In this workshop, we solicit papers on the challenges,
requirements, tools, and techniques related to security, privacy,
and trust for pervasive applications along with some open issues.
This workshop will serve as a platform for the interaction among like-minded
researchers and practitioners to identify future theoretical and experimental
research directions of security, privacy, and trust in pervasive applications.
SCOPE OF THE WORKSHOP
Topics of interest include, but are not limited to,
the following:
-
Security challenges in pervasive computing
-
Intrusion detections in pervasive computing
-
Models for access control and authentication for
pervasive applications
-
Secure service discovery mechanisms
-
Hardware security issues for pervasive computing
-
Analysis of security protocols for pervasive computing
-
Models for privacy management
-
Day to day privacy in pervasive computing
-
Location aware privacy
-
Privacy aware service discovery mechanisms
-
Protocols for trust management in pervasive computing
-
Models for ensuring trust in pervasive environments
-
Trust assessment, negotiation, and collaboration
-
Audit and accountability in pervasive systems
-
Secure information management in pervasive computing
-
Tradeoffs between security and other criteria
-
Autonomous adaptation of pervasive systems to changes
in threats
-
Pervasive security and privacy impact on social
and legal aspects
IMPORTANT DATES
Apr 1 , 2006: Workshop Paper
Submission due date (Deadline Extended to Friday
April 14).
May 15, 2006 notification of acceptance
June 25, 2006 camera-ready due
SUBMISSION
Papers must be submitted electronically via the SPTPA
2006 Submission Page (http://compsac.cs.iastate.edu/SPTPA/).
The format of submitted papers should follow the guidelines for IEEE
conference proceedings. All papers will be carefully reviewed by at
least three reviewers. Papers will be accepted (and can be submitted)
as regular papers (six pages), short papers, or fast abstracts. Acceptance
and final category will depend on reviewer feedback.
Accepted papers or fast abstracts will be published
in the workshop proceedings of the 30th IEEE Computer Software and
Applications Conference (COMPSAC 2006) by IEEE CS Press. At least
one of the authors of each accepted paper or fast abstract must register
as a full participant of the workshop to have the paper or fast abstract
published in the proceedings.
WORKSHOP ORGANIZERS
Chairs
Sheikh Iqbal Ahamed
Dept. of Math, Statistics, and Computer
Science, Marquette University
Milwaukee, Wisconsin 53201, USA
Phone: 414-288-5222, Fax: 414-288-5472
Email: iq@mscs.mu.edu
Web: www.mscs.mu.edu/~iq
|
Mohammad Zulkernine
School of Computing, Queens University
Kingston, Ontario
Canada K7L 3N6
Tel: (613) 533-2837, Fax: (613) 533-6513
Email: mzulker@cs.queensu.ca
Web: www.cs.queensu.ca/~mzulker |
Program Committee Members
Jalal Al-Muhtadi
King Saud University, Saudi Arabia
Doo Hwan Bae
KAIST, Korea
Umesh Bellur
IIT Bombay, India
Ying Cai
Iowa State University, USA
William Chu
TungHai University, Taiwan
Tadashi Dohi
Hiroshima University, Japan
Stephan Eidenbenz
Los Alamos Nat. Lab, USA
Antonio Mana Gomez
University of Malaga, SPAIN
Neelam Gupta
University of Arizona, USA
Christian Hauser
University of Stuttgart, Germany
Raquel Hill
Indiana University, Bloomington, USA
Andreas Holzinger
University of Graz, Austria
Patrick C. K. Hung
Univ. of Ontario Inst. of Tech., Canada
Min-Shiang Hwang
National Chung Hsing Univ., Taiwan
Anwar Haque
Bell Canada, Hamilton, Canada
Sahra Sedigh-Ali
Univ. of Missouri at Rolla, USA
Vana Kalogeraki
University of California, Riverside, USA
Sozo Inoue
Kyushu Univ, Japan
|
Gour Karmakar
Monash University, AustraliaTom Karygiannis
NIST, USA
Djamel Khadraoui
CRP Henri Tudor, Luxembourg
Mujtaba Khambatti
Microsoft Corporation, USA
Gopi Kolli
Intel Corporation, USA
Zakaria Maamar
Zayed University, UAE
Qusay H. Mahmoud
University of Guelph, Canada
Bob Mayo
Compaq's Western Research Lab. USA
Kiran Mudiam
Motorola Corporation, USA
Nanjangud C Narendra
IBM Corporation , India
Mukesh Singhal
Univ. of Kentucky, USA
Wensheng Zhang
Iowa State University, USA
George Roussos
University of London, UK
Achilles Kameas
Hellenic Open University, Greece
Miroslav Velev
Consultant, USA
Stephen Weis
MIT, USA
Wang Yu
Auburn University, USA
Taieb Znati
University of Pittsburgh, USA |
GENERAL INQUIRIES
For updated information, please refer to http://conferences.computer.org/compsac/2006/SPTPA.html
or contact the Program Co-Chairs: iq@mscs.mu.edu
or mzulker@cs.queensu.ca
|