| |||||||||||||||
ACM ToIT Special Issue 2015 : Internet of Things (IoT): Secure Service Delivery | |||||||||||||||
Link: http://toit.acm.org/CfP/ACM-ToIT-CfP-IoT-Security.pdf | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Recent advances in sensing technologies, on-line social networking, the Internet of Things (IoT), and mobile and cloud technologies are:
• blurring the boundaries between the physical, social, and cyber worlds; • fueling the astonishing growth of internet users (from 1.158 billion in 2007 to 3 billion in 2014) and Internet connected devices (to 15 billion in 2014); and • causing an explosion of data produced from a myriad of internet-connected devices and social networks. Despite an expanding array of business, government, and scientific applications that require distilling knowledge from Big IoT cyber-physical and social (cyber-social) Data, there is no easy way to exploit such data, particularly in real-time, or develop secure IoT based services. The ability to harness such data has become a priority for researchers, organizations, and governments. However, it also raises important questions and introduces new challenges for the security of IoT based services and the privacy of individuals. The aim of this special section is to bring together cutting-edge research with particular emphasis on novel and innovative techniques to ensure the security and privacy of IoT services and users. We solicit research contributions and potential solutions for IoT-based secure service delivery anywhere and at any time. This special section emphasizes service-level considerations. Topics of interest include, but are not limited to: • Security of IoT Services • IoT Service Architectures and Platforms • Real-Time IoT Service Security Analytics and Forensics • Organizational Privacy and Security Policies • Governance for IoT Services • Social Aspects of IoT Security • Security and Privacy Threats to IoT Services and Users • Accountability and Trust Management • Legal Considerations and Regulations • Case Studies and Applications |
|