| |||||||||||||||
PCSSNSE 2012 : Pervasive Communication Security, Social Networking and Social Engineering Workshop | |||||||||||||||
Link: http://www.conf-icnc.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
SUBMISSION DEADLINE EXTENDED
Call for Papers Pervasive Communication Security, Social Networking and Social Engineering Workshop In conjunction with The International Conference on Computing, Networking and Communications(ICNC 2012) Maui, Hawaii, USA January 30 - February 2, 2012 http://www.conf-icnc.org/ Contact Information: Narasimha Shashidhar, Sam Houston State University, Huntsville, TX, USA karpoor@shsu.edu Lei Chen, Sam Houston State University, Huntsville, TX, USA chen@shsu.edu Scope: The future of communication relies on the ability of communication systems to blend into the user’s environment with the goal of supporting social and collaborative communication and computation. To this end, providing confidentiality and integrity of communicated data are desired key security features in a pervasive communication system. Users need to be able to trust the communication systems and find out how trustworthy their peers are. As the communication and associated systems become more pervasive, these privacy issues are amplified. These security requirements result in many challenges in the research and development of pervasive systems. The aim of this workshop is to enable researches, scientists, and engineers in the community to exchange and share ideas and experience, and demonstrate latest research outcomes on all areas of security, trust and privacy in pervasive communication systems. This workshop solicits original work in various aspects of, but not limited to, the following topics: · Decentralized, scalable social networking · Privacy-aware, personally controlled social networking · Availability and resilience · Community based secure communication · Data confidentiality and integrity · Anonymity and Pseudonymity · New approaches to trust and reputation · New attack paradigms · Social engineering, Spam and Phishing · Context aware services and applications · Scalable and efficient authentication and key management solutions · Designing appropriate reputation systems for various situations · Utilizing communities to build trust · Managing privacy of personal information Submission Guidelines Please follow the author instructions at http://www.conf-icnc.org/author.htm For submission: Workshop papers should be submitted via EDAS at the conference page: http://edas.info/N10987. In addition, please send a pdf file of your paper to karpoor@shsu.edu Important dates Submission deadline Sep 14, 2011 Notification of acceptance Sept. 30, 2011 Submission of camera-ready version and Registration Oct. 20, 2011 |
|