| |||||||||||||
PMC-CUC 2016 : Cybersecurity for Ubiquitous Cities -- Pervasive and Mobile Computing | |||||||||||||
Link: http://www.journals.elsevier.com/pervasive-and-mobile-computing/call-for-papers/cybersecurity-for-ubiquitous-cities/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Cybersecurity for Ubiquitous Cities
A Ubiquitous City (U-city) is a new concept to integrate information and communication technologies (ICT) into urban areas using ubiquitous computing technologies. These technologies can strongly improve the quality of life in the 21st century, as the world’s population is becoming more and more urban. Relevant applications of ubiquitous ICT technologies include management of traffic, waste, electricity, sewage, air pollution and water quality, monitoring fire and crime, conserving renewable resources, coordinating urban policies and programs for urban planners etc. A U-city can be seen as a fusion of information systems and social systems. Within this paradigm, every device and service is linked to an information network through wireless networking and RFID tags and sensors. Any wearable device such as a smart phone, a smart watch or smart glasses can also be a ubiquitous point to collect data and get information from a central administrator. Thus the concept of U-city provides a two-way communication platform between citizens and government anytime anywhere and for any services. However, despite the huge advantages of U-cities, serious stability and reliability problems can occur if security is not considered in the design and development of new ICT ubiquitous services to be integrated into U-city projects. For example, a ubiquitous service or network can be corrupted and fall under the control of malicious agents. Also, sensitive data can be captured by hackers. Such circumstances result into serious disruption. On the other side, privacy is another issue that has to be addressed by design. No one wants to be traced for his daily activity or personal habits. Since ubiquitous devices are pervasive, location privacy becomes especially important. This special issue intends to gather cutting-edge results on cybersecurity issues in the flourishing domain of ubiquitous cities. The aim of the proposed Special Issue is to promote research and reflect the most recent advances of technologies in cybersecurity of ubiquitous cities, with emphasis on the following aspects, but certainly without limitation to them: The list of topics includes, but is not limited to: - Access control in U-cities - Authentication in U-cities - Anti-social event detection in U-cities assisted by big data analysis - Cloud-assisted secure applications for U-cities - Key management in U-cities - Lightweight security for wearable devices in U-cities - Location and trajectory privacy for mobile devices in U-cities - Multimedia security and privacy in U-cities - New business processes and models involving cybersecurity in U-cities - Physical security threats and solutions to endpoints in U-cities - Privacy Enhanced Technologies (PET) for U-cities - Privacy preserving data collection and disclosure in U-cities - Security and citizen privacy-related legal issues in U-cities - Security and privacy for electronic healthcare in U-cities - Security and privacy for integrated design and development of U-cities - Secure and privacy-preserving information exchange for intelligent transportation in U-cities - Secure and privacy-preserving surveillance in U-cities - Secure big data analysis for U-cities - System model and architecture for security and privacy enabled U-cities - Secure outsourcing for pervasive devices in U-cities Note that papers whose main contribution is of cryptographic nature may not be appropriated for this special issue. Important Dates Submission deadline: July 15, 2016 Initial feedback to authors: September 15, 2106 Final notification: December 10, 2016 Expected Publication of the Special Issue: 2017 Submission Guidelines All submissions have to be prepared according to the Guide for Authors as published in the Journal website at http://www.ees.elsevier.com/pmc/. Authors should select “SI: Cybersecure UCity”, from the “Choose Article Type” pull-down menu during the submission process. All contributions must not have been previously published or be under consideration for publication elsewhere. A submission based on one or more papers that appeared elsewhere (including those invitations from Special Issue submission of ACISP 2016) has to comprise major value-added extensions over what appeared previously (at least 30% new material). Authors are requested to attach to the submitted paper their relevant, previously published articles and a summary document explaining the enhancements made in the journal version. Guest Editors of the Special Issue: - Joseph Liu, Monash University, Australia joseph.liu@monash.edu - Urs Hengartner, University of Waterloo, Canada urs.hengartner@uwaterloo.ca - Xinyi Huang, Fujian Normal University, China xyhuang81@yahoo.com |
|