Difference between revisions of "NASSUE 2010"
(New page: {{Event |Acronym=NASSUE 2010 |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Type=Workshop |Field=Computer security and reliabil...) |
(→Submissions) |
||
(2 intermediate revisions by one other user not shown) | |||
Line 11: | Line 11: | ||
|State=ON | |State=ON | ||
|Country=Canada | |Country=Canada | ||
− | |Submission deadline=2010/05/ | + | |Submission deadline=2010/05/31 |
}} | }} | ||
''Enter your description here. Maybe just paste in the call for papers.'' | ''Enter your description here. Maybe just paste in the call for papers.'' | ||
Line 17: | Line 17: | ||
==Topics== | ==Topics== | ||
- Availability, dependability, survivability, & resilience issues in UE | - Availability, dependability, survivability, & resilience issues in UE | ||
+ | |||
- Authentication, Authorization, Access control & ID management in UE | - Authentication, Authorization, Access control & ID management in UE | ||
+ | |||
- Redundancy, fault-tolerant models, and failure prevention of UCS | - Redundancy, fault-tolerant models, and failure prevention of UCS | ||
+ | |||
- Trust modeling and management in UE | - Trust modeling and management in UE | ||
+ | |||
- Risk assessment and management in UE | - Risk assessment and management in UE | ||
+ | |||
- Network security issues and protocols in UCS | - Network security issues and protocols in UCS | ||
+ | |||
- Cryptographic protocols and key management in UCS | - Cryptographic protocols and key management in UCS | ||
+ | |||
- Cross-layer design for security mechanisms | - Cross-layer design for security mechanisms | ||
+ | |||
- Network control technologies for NA. | - Network control technologies for NA. | ||
+ | |||
- Novel threat, attacks, vulnerabilities, countermeasures | - Novel threat, attacks, vulnerabilities, countermeasures | ||
+ | |||
- Reverse engineering of malicious code | - Reverse engineering of malicious code | ||
+ | |||
- Intrusion detection, IDS / IPS in UE | - Intrusion detection, IDS / IPS in UE | ||
+ | |||
- Anonymity, user privacy, and location privacy in UE | - Anonymity, user privacy, and location privacy in UE | ||
+ | |||
- Content protection and DRM for UCS | - Content protection and DRM for UCS | ||
+ | |||
- System/network management techniques and strategies in UE. | - System/network management techniques and strategies in UE. | ||
+ | |||
- Network forensics and fraud detection | - Network forensics and fraud detection | ||
+ | |||
- Surveillance and Privacy-enhancing technologies in UE | - Surveillance and Privacy-enhancing technologies in UE | ||
+ | |||
- Adaptive and Autonomic security for UCS | - Adaptive and Autonomic security for UCS | ||
+ | |||
- Role of biometrics in UE | - Role of biometrics in UE | ||
+ | |||
- NAS issues in e-commerce, e-government, e-health | - NAS issues in e-commerce, e-government, e-health | ||
+ | |||
- NAS business models and NAS implementations in UE | - NAS business models and NAS implementations in UE | ||
+ | |||
- Specification, design, development, and deployment of NAS mechanisms | - Specification, design, development, and deployment of NAS mechanisms | ||
+ | |||
- Models, architectures, protocols for NAS | - Models, architectures, protocols for NAS | ||
+ | |||
- Standards, guidelines and certification for NAS in UE | - Standards, guidelines and certification for NAS in UE | ||
+ | |||
- Formal methods and software engineering for NAS | - Formal methods and software engineering for NAS | ||
+ | |||
- Legal, ethical and policy issues related to NAS in UE | - Legal, ethical and policy issues related to NAS in UE | ||
+ | |||
- Proactive approaches to NAS | - Proactive approaches to NAS | ||
+ | |||
- New ideas and paradigms for NAS in UE | - New ideas and paradigms for NAS in UE | ||
− | + | ||
− | + | chashm maa say mikonim hamatn ye usere jadid peidaa konim va addresesho baratun bezaarim,albate age kheili ajale daashte baashid va hosele khodetunam mitunid tu saitaaye faarsi begardid va ye seri user. peidaa konid vali mamulanhar chand vaght ye baar ghateshun mikonano baayad donbaale ye taazash baashim mamnun az tazakoretun. | |
− | + | ||
==Important Dates== | ==Important Dates== | ||
− | - Full Paper Due: May | + | - Full Paper Due: May 31, 2010 |
+ | |||
- Notification of Acceptance: July 16, 2010 | - Notification of Acceptance: July 16, 2010 | ||
+ | |||
- Final Camera-Ready Due: July 30, 2010 | - Final Camera-Ready Due: July 30, 2010 | ||
+ | |||
==Committees== | ==Committees== | ||
* Co-Organizers | * Co-Organizers | ||
Line 56: | Line 86: | ||
* Workshop Chair | * Workshop Chair | ||
- Binod Vaidya, Inst. of Telecom, Portugal | - Binod Vaidya, Inst. of Telecom, Portugal | ||
+ | |||
- Shiuh-Jeng Wang, Central Police Univ, Taiwan | - Shiuh-Jeng Wang, Central Police Univ, Taiwan | ||
+ | - Joel Rodrigues, Inst. of Telecommunications, Univ of Beira Interior, Portugal | ||
+ | |||
+ | * International Advisory Committee | ||
+ | - Dimitrios Makrakis, Univ of Ottawa, Canada | ||
+ | - Pascal Lorenz, Univ of Haute Alsace, France | ||
+ | |||
+ | * Publicity Chair | ||
+ | - Surya Nepal, CSIRO ICT Centre, Australia | ||
* Program Committee Members | * Program Committee Members | ||
− | + | - Binod Vaidya, Univ of Ottawa, Canada | |
+ | |||
+ | - Shiuh-Jeng Wang, Central Police Univ, Taiwan | ||
+ | |||
+ | - Joel Rodrigues, Inst. of Telecommunications, Univ of Beira Interior, Portugal | ||
+ | |||
+ | - ByungRae Cha, GIST, Korea | ||
+ | |||
+ | - K. P. Chow, Univ of Hong Kong, Hong Kong | ||
+ | |||
+ | - Jiankun Hu, RMIT, Australia | ||
+ | |||
+ | - Min-Shiang Hwang, National Chung Hsing Univ, Taiwan | ||
+ | |||
+ | - Seungjoo Kim, Sungkyunkwan Univ, Korea | ||
+ | |||
+ | - Chae Hoon Lim, Sejong Univ, Korea | ||
+ | |||
+ | - Surya Nepal, CSIRO ICT Centre, Australia | ||
+ | |||
+ | - Antonio Nogueira, Univ of Aveiro, Portugal | ||
+ | |||
+ | - Khaled Salah, King Fahd Univ of Petroleum & Minerals, Saudi Arabia | ||
+ | |||
+ | - Ning Zhang, Univ of Manchester, UK | ||
+ | |||
+ | - Bidi Yang, Univ of Ottawa, Canada |
Latest revision as of 01:52, 22 December 2012
NASSUE 2010 | |
---|---|
Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments
| |
Subevent of | WiMob 2010 |
Dates | 2010/10/12 (iCal) - 2010/10/12 |
Homepage: | nassue2010.99k.org |
Location | |
Location: | Niagara Falls,, ON, Canada |
Loading map... | |
Important dates | |
Submissions: | 2010/05/31 |
Table of Contents | |
Contents | |
Enter your description here. Maybe just paste in the call for papers.
Topics
- Availability, dependability, survivability, & resilience issues in UE
- Authentication, Authorization, Access control & ID management in UE
- Redundancy, fault-tolerant models, and failure prevention of UCS
- Trust modeling and management in UE
- Risk assessment and management in UE
- Network security issues and protocols in UCS
- Cryptographic protocols and key management in UCS
- Cross-layer design for security mechanisms
- Network control technologies for NA.
- Novel threat, attacks, vulnerabilities, countermeasures
- Reverse engineering of malicious code
- Intrusion detection, IDS / IPS in UE
- Anonymity, user privacy, and location privacy in UE
- Content protection and DRM for UCS
- System/network management techniques and strategies in UE.
- Network forensics and fraud detection
- Surveillance and Privacy-enhancing technologies in UE
- Adaptive and Autonomic security for UCS
- Role of biometrics in UE
- NAS issues in e-commerce, e-government, e-health
- NAS business models and NAS implementations in UE
- Specification, design, development, and deployment of NAS mechanisms
- Models, architectures, protocols for NAS
- Standards, guidelines and certification for NAS in UE
- Formal methods and software engineering for NAS
- Legal, ethical and policy issues related to NAS in UE
- Proactive approaches to NAS
- New ideas and paradigms for NAS in UE
chashm maa say mikonim hamatn ye usere jadid peidaa konim va addresesho baratun bezaarim,albate age kheili ajale daashte baashid va hosele khodetunam mitunid tu saitaaye faarsi begardid va ye seri user. peidaa konid vali mamulanhar chand vaght ye baar ghateshun mikonano baayad donbaale ye taazash baashim mamnun az tazakoretun.
Important Dates
- Full Paper Due: May 31, 2010
- Notification of Acceptance: July 16, 2010
- Final Camera-Ready Due: July 30, 2010
Committees
- Co-Organizers
- Workshop Chair
- Binod Vaidya, Inst. of Telecom, Portugal
- Shiuh-Jeng Wang, Central Police Univ, Taiwan
- Joel Rodrigues, Inst. of Telecommunications, Univ of Beira Interior, Portugal
- International Advisory Committee
- Dimitrios Makrakis, Univ of Ottawa, Canada
- Pascal Lorenz, Univ of Haute Alsace, France
- Publicity Chair
- Surya Nepal, CSIRO ICT Centre, Australia
- Program Committee Members
- Binod Vaidya, Univ of Ottawa, Canada
- Shiuh-Jeng Wang, Central Police Univ, Taiwan
- Joel Rodrigues, Inst. of Telecommunications, Univ of Beira Interior, Portugal
- ByungRae Cha, GIST, Korea
- K. P. Chow, Univ of Hong Kong, Hong Kong
- Jiankun Hu, RMIT, Australia
- Min-Shiang Hwang, National Chung Hsing Univ, Taiwan
- Seungjoo Kim, Sungkyunkwan Univ, Korea
- Chae Hoon Lim, Sejong Univ, Korea
- Surya Nepal, CSIRO ICT Centre, Australia
- Antonio Nogueira, Univ of Aveiro, Portugal
- Khaled Salah, King Fahd Univ of Petroleum & Minerals, Saudi Arabia
- Ning Zhang, Univ of Manchester, UK
- Bidi Yang, Univ of Ottawa, Canada
Acronym | NASSUE 2010 + |
End date | October 12, 2010 + |
Event type | Workshop + |
Has coordinates | 43° 6' 24", -79° 3' 50"Latitude: 43.106561111111 Longitude: -79.063902777778 + |
Has location city | Niagara Falls, + |
Has location country | Category:Canada + |
Has location state | ON + |
Homepage | http://nassue2010.99k.org + |
IsA | Event + |
Start date | October 12, 2010 + |
Subevent of | WiMob 2010 + |
Submission deadline | May 31, 2010 + |
Title | Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments + |