| |||||||||||||||
SecATM 2016 : International Workshop on Security in Air Traffic Management and other Critical Infrastructures | |||||||||||||||
Link: http://secatm.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Global air traffic management and other critical infrastructure systems are evolving from siloed, local, proprietary systems to interconnected wide-area information systems. Within the field of air traffic management, there is rapid development, as demonstrated by the FAA NextGen and the European Single European Sky ATM Research programmes. Similar large scale transformation programmes have been launched for critical infrastructure systems. The higher levels of automation and interconnectivity translate into increased security risks and poses challenges to system and security engineering.
Air traffic management (and aviation critical infrastructure) security is understood to include two dimensions: the self-protection / resilience of the ATM system / critical infrastructure, and collaboration with other security stakeholders concerning security incidents. This workshop will focus on security of next-generation air traffic management systems and similar critical information infrastructures. The objective is to provide an interdisciplinary forum for academic and professionals to discuss recent progress and research in this field. Given the nature of the security dimensions, papers are encouraged to address one dimension or show interdependencies between the both. Papers may address institutional, organisational, methodological, or technological aspects of the security of air traffic management / similar critical infrastructures. Papers may report on on-going or completed research, case-studies, or real-world security development / deployment activities. Topics ------ Suggested topics include, but are not limited to the following in ATM and related critical infrastructures: - Security Policy - Security risk assesment and security management - Security (system) validation - Best practices, security proceess optimisation - Secure middleware solutions - Secure information management, enhanced communication, surveillance, and navigation - Challenges of security assessment in a safety-oriented environment or omplex systems - Security situation management including security incident management within and across organisations - Experience reports |
|