posted by user: wpetrae || 2123 views || tracked by 4 users: [display]

PSPAE 2011 : 3rd Workshop on Privacy and Security in PervasiveEnvironments

FacebookTwitterLinkedInGoogle

Link: http://www.petrae.org
 
When May 25, 2011 - May 27, 2011
Where Crete, Greece
Submission Deadline Mar 10, 2011
Notification Due Mar 20, 2011
Final Version Due Mar 25, 2011
 

Call For Papers

**************************************

Call for Papers - Workshop PSPAE 2011
**************************************
The 3rd Workshop on
"Privacy and Security in Pervasive Environments "

*** Proceedings published by ACM (electronic) **
(in conjunction with 4th International Conference on
PErvasiveTechnologies Related to Assistive Environments
(PETRA) 2011)
Crete, Greece


Workshop Theme and Goals
Pervasive computing pushes forward a vision where technology is integrated into everyday objects with the intent of facilitating the life of humans and making their interaction with the surrounding environment simpler. A critical element of pervasive and ambient intelligence environments is awareness: computing environments become aware of the activities of their users and a lot of their daily activities can be captured and recorded for future use. The users frequently ignore the amount of their personal data being collected and processed or shared wirelessly and how much their privacy may be invaded. An understanding of privacy in the domain of pervasive computing and learning to address privacy concerns is very critical. Ensuring the security and privacy of users' data is a critical prerequisite to creating public trust for pervasive environments. It is therefore, necessary for such environments to be designed, implemented and used in compliance with data subjects' fundamental rights while the adoption of specific safeguards is required. In addition, since misuse of collected data is easily enabled, preventive measures are needed. .

Privacy-Enhancing Technology (PET) concepts have been developed and applied while guidelines are found in the literature on how to deal with data so that the application of pervasive technology to become privacy-friendly. However, using privacy enabling and enhancing tools is not always easy. Pervasive computing environments are based on the use of wireless devices that have limited processing power, bandwidth, throughput, memory etc. These factors put a resource limitation on implementing resource demanding tools and protocols for privacy protection. Additionally, legal support for widespread use of PETs is missing and the introduction of additional legislation should be examined.





Topics of Interest

We are interested in original papers and case studies describing advances in all areas of assistive technologies for physical, occupational therapy and rehabilitation, including but not limited to:
Privacy, security and trust in the design of pervasive and ambient intelligence environments
Ethical issues of Ambient Intelligence
Ethical guidelines for the design of pervasive and ambient intelligence environments
User and/or usability/user experience studies related to the design of pervasive and ambient intelligence environments
Policies and practices for access, authentication, authorization and auditing in pervasive and ambient environments
Policies for information sharing in pervasive environments
User and context awareness in pervasive computing and ambient intelligent environments
Access Control enforcement, authentication and secure data access in pervasive environments
Encryption, cryptographic techniques to ensure privacy and security in pervasive environments
Case studies in respect to privacy and security in pervasive environments
Developing secure pervasive/ambient infrastructures
Important Dates
Paper Submission Deadline: March 10, 2011

Acceptance Notification: March 20, 2011

Workshop Chairs
Grammati Pantziou
Technological Educational Institution (T.E.I.) of Athens, Greece
Petros Belsis
T.E.I. of Athens, Greece
Tassos Dimitriou
A.I.T., Athens, Greece

Submission Information
Submissions should be in ACM style format and will be accepted as either full paper (8 pages) or short paper (4 pages). For Latex and MS Word templates please go to http://www.acm.org/sigs/publications/proceedings-templates Please refer also to the conference submission guidline latest announcements.



Related Resources

BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
SPICES 2024   The 3rd Workshop on Security and Privacy in Connected Embedded Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
S&P 2025   The 45th IEEE Symposium on Security and Privacy
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
ICONSEC 2024   3rd International Conference On Cyber Security and Digital Forensics
No Hat 2024   No Hat - COMPUTER SECURITY CONFERENCE
NordSec 2024   The 29th Nordic Conference on Secure IT systems (NordSec) 2024
BDPC--EI 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)