posted by organizer: abbashaider || 2096 views || tracked by 1 users: [display]

SSTM 2017 : Security, Safety and Trust Management (SSTM) Track @ The 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).

FacebookTwitterLinkedInGoogle

Link: http://www.sstm2017.deib.polimi.it/
 
When Jun 21, 2017 - Jun 23, 2017
Where Pozna, Poland
Submission Deadline Feb 26, 2017
Notification Due Apr 2, 2017
Final Version Due Apr 15, 2017
Categories    security & privacy   trust management   information assurance
 

Call For Papers

Call for papers
The evolving nature of today internet continuously outdates the existing security and safety mechanisms. As these heterogeneous environments combine different technologies - systems and applications - they have different understanding for what a resource could possibly be or do, and have different security policies, information assurance needs and safety rules. Therefore, there is an emerging need to propose robust, powerful and reliable solutions. These advancements have a great impact on the software and system’s architectures, resulting in a highly dynamic smart networked environment. Independent of the providers, all the systems share the need to restrict or grant access for the required resources based on security policy to cope with security threats, and the need to sustain resilience of the environment in face of safety hazards. For security and safety, trust and trust management act as powerful lubricants.
The SSTM track deals with providing state-of-art security policies, relationships and credentials aiming to allow direct authentication for security critical activities. By reinforcing trust across the different components of a system, security of the sensitive resources could be ensured more effectively. Similarly, the establishment of different levels of trust within the systems involved in the network can actually improve the security and cooperation among the network entities. It can also help in reducing the malicious activities and the safety hazards.

Topics
SSTM seeks for paper submissions in a wide range of security safety trust management related topics including but not limited to the following:
Ø Trustworthy applications, including web-based systems
Ø Trusted mobile computing platforms
Ø Trustworthy embedded and Cyber-physical systems, and Internet of Things
Ø User Data Privacy
Ø Active Multimedia Security
Ø Ubiquitous Systems Security
Ø Legal Aspects of Information Security and Assurance
Ø Malware Detection and Analysis
Ø Social Media Security
Ø Open and Distributed Systems Security Mechanisms
Ø Access Control and Authorization
Ø Security in Cloud Computing
Ø Organizational Information Assurance Mechanisms
Ø Secure Software Development
Ø Intrusion detection and resilience leveraging trusted computing
Ø Security policies and management of trusted systems
Ø Safety in IoT and Smart Environments




Publication: Accepted papers will be included in the proceedings published by the IEEE Computer Society Press and will be archived in the IEEE Xplore Digital Library.

Important Dates
Full paper submission deadline: February 26th, 2017
Notification of acceptance: April 2nd, 2017
Camera-ready papers deadline: April 15th, 2017
WETICE_2017 Conference: June 21-23, 2017

Submission
Authors are invited to submit full papers limited to 6 pages or short papers limited to 4 pages of double column text including tables and references, formatted using the IEEE Proceeding template.
The TRUST submission system (EasyChair) is available here:
https://easychair.org/conferences/?conf=wetice2017


Organizing Committee

Track Chairs

Haider Abbas, Center of Excellence in Information Assurance, King Saud University, KSA
Eugenio Orlandi, Independent Security Consultant, The Hagues, Netherlands

Program Committee Chairs

Farrukh Aslam Khan, King Saud University, KSA
Oliver Popov, Stockholm University, Sweden
Asif Masood, National University of Sciences & Technology, Pakistan

PROGRAM COMMITTEE

William Allen, Florida Institute of Technology, USA
Fredrik Björck, Stockholm University, Sweden
Mahsa Teimourikia, DEIB, Politecnico di Milano, Italy
Christer Magnusson, Royal Institute of Technology, Sweden
Imran Rashid, National University of Sciences & Technology, Pakistan
Nima Khakzad Rostami, Delft University of Technology, Netherlands
Enrico Zio, Politecnico di Milano, Italy
Hayretdin Bahsi, Tallinn University of Technology, Estonia
Francesco Di Maio, Politecnico di Milano, Italy
Nicola Pedroni, Université Paris-Saclay, France
Kashif Saleem, King Saud University, KSA
Giovanni Sansavini, Institute of Energy Technology, ETH Zurich, Switzerland
Erisa Khalifi, Imperial College London, UK
Anam Sajid,Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Pakistan
François Charoy, University of Lorraine, France
Hiroki Suguri, Miyagi University, Japan
Sule Yildirim-Yayilgan, Norwegian University of Science and Technology, Norway
Yin Zhang, Zhongnan University of Economics and Law, China
Dhiah el Diehn I. Abou-Tair, German Jordanian University, Jordan
Asad Raza, Abu Dhabi Polytechnic Institute of Applied Technology , UAE
Duminda Wijesekera, George Mason University, USA

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IWSPA 2025   IWSPA 2025 : The 11th ACM International Workshop on Security and Privacy Analytics
ISSSR 2025   The 11th IEEE International Symposium on System Security, Safety, and Reliability
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
TrustNLP Workshop 2024   TrustNLP: Fourth Workshop on Trustworthy Natural Language Processing
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
TRS 2025   Transportation Research Symposium
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
TrustCom 2024   The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications