posted by user: STM_events || 4231 views || tracked by 3 users: [display]

Chip-to-Cloud Security Forum 2012 : Chip-to-Cloud Security Forum


When Sep 19, 2012 - Sep 20, 2012
Where Nice, French Riviera
Submission Deadline Mar 23, 2012
Notification Due Apr 30, 2012
Final Version Due Aug 31, 2012
Categories    secure embedded systems techno   trusted mobile comm. & transac   internet of things

Call For Papers

Call for Papers

Chip-to-Cloud Security Forum
Smart Trusted Technologies & Services for the Networked Society

The Chip-to-Cloud Security Forum is the continuation of Smart Event, combining together Smart Mobility, e-Smart and partly World e-ID conferences into a wide-ranging single event dedicated to the Future Networked Society security.
For 12 years, Smart Event has addressed Academic and Industry key advances in Smart Security. Starting from purely embedded and smart cards security, then adding mobile and biometrics applications, Smart Event has gradually enlarged its scope to cover a larger "digital security domain" including trusted applications in telecoms, Internet, banking, e-gov., etc. Along with the continuously increasing performance of the nano-, micro- technologies and the cheaper and faster modern communication networks, every physical resource now form part of massive infrastructures supporting on-line services such as M2M, Mobile Internet, Mobile Payments, Cloud Computing Applications & Services, Social Networks... This shift from off-line secure personal devices (mostly embedded secure microcontrollers and smart cards) based transactions to mobile and on-line trusted services is reflected by the new title Chip-to-Cloud Security Forum.
Taking a step forward, those connected services announce a near future best described by the Internet of Things (IoT) design paradigm: a smart environment where devices, sensors, actuators, mobile phones, etc. are able to interact with each other and cooperate through the Internet. This perspective raises new security, trust and privacy challenges at unseen levels, impacting the digital world in all its components, from the "things" to users' everyday life, from the physical space to the society. The Chip-to-Cloud Security Forum will also address these IoT's broad security challenges arising from our Networked Society.

The Forum offers a high level international conference for researchers from Academia, Industry experts and engineers, Industry decision-makers, practitioners from standardization bodies and government professionals to share their vision, to figure out strategies for the future, to point out business opportunities and seek collaboration prospects, to present state-of-the-art research and discuss the most recent advances in embedded, mobile and cloud security at both hardware and software levels with regards to the dynamics of these technologies towards the Internet of Things challenges.
The Chip-to-Cloud Forum Program Committee is looking for technical papers describing original ideas groundbreaking results, new techniques, new methodologies, proposing new research directions, highlighting standardization and regulatory issues for resolving open problems spanning from all aspects of current and future IoT systems security and trust ability.
Reinforcing the interactions between academic research and Industry:
In order to reinforce the interactions between academic research and Industry, the Chip-to-Cloud Security Forum Program Committee is also looking for Industry specific papers preferably focusing on:
- academic research challenges resulting from the industry context,
- the design, implementation, deployment and use cases of realistic systems that have been built and deployed,
- the engineering challenges faced by the Industry in a commercial context and versus business opportunities, success stories and/or failures.

The submissions may address one or more of the topics mentioned below or others that authors believe to be of great interest to the audience.

- Secure embedded systems design:
- Advanced architectures
- Secure HW/SW co-specification
- Formal verification
- HW/SW co-validation
- System validation
- Run-time & design time reconfigurable secure platforms & processors
- Multiple constraints driven embedded systems design & optimization
- Secure hardware technologies
- Secure software architectures & engineering
- Secure embedded software & OS
- Advances in ubiquitous and domain specific cryptography, PUFs, etc.
- Strong authentication technologies (HW& SW) for Cloud Computing, Services Security and other Enterprise and personal usages.
- Advances in embedded Java & Java Card
- NFC and contactless technologies security
- (Mobile) Trusted Computing architectures
- Packaging issues & innovations

- Advances in Secure Element technologies: USIM/UICC, embedded SIM, SD card
- TEE in mobile devices
- Smart card web server
- Trusted Services Management technologies
- Smartphone's security: device, OS and secure mobile apps development
- Contactless/wireless /mobile systems security risks analysis
- Advances in NFC and contactless technology
- Electronic Identity security:
- Biometrics advances & applications
- e-ID domain specific cryptography
- e-ID based secure applications
- Privacy protection
- Mobile Internet, Mobile and cloud computing
- Trusted mobile services
- Use cases and deployments of m-payment, transportation, media & content applications
- Smart mobility research projects such as impaired and handicapped people, location-aware apps, smart cities, etc.
- Innovative business models between MNOs/ Service Providers/Banks/Other Stakeholders

- Cloud Computing Security, Security as a Service (SaaS)
- M2M Deployment & Security
- M2M applications to:
- Transportation, automotive,
- Smart grids/meter,
- SCADA system,
- Smart physical infrastructure,
- Energy efficiency,
- Environmental monitoring, medical devices, telematics and robotics...
- LTE and mobile broadband security issues
- Mobility in enterprise security management
- Cyber Physical Systems and Cyber Physical Society security issues
- Wireless Sensor Networks (WSNs) and Advanced Wireless Sensors
- Wireless Personal Area Networks technologies (UWB, 6LoWPan, etc.)
- Wireless Body Area Networks

- Standardization issues & progresses for increasing trust and interoperability
- Security, privacy and content protection: standardization issues & progresses, security evaluations methodologies (attacks & countermeasures, best practices, etc.), certifications criteria and schemes
- Products and systems security evaluation and certification standards
- Transnational collaborative R&D frameworks, initiatives and programs
- Transnational regulatory issues & progresses to make the internet and services infrastructures more trustable and secure.

Related Resources

ADRW 2021   «Archives during rebellions and wars». From the age of Napoleon to the cyber war era
IJAB 2021   International Journal of Advances in Biology
QUORS 2021   The 15th IEEE International Workshop on Quality Oriented Reuse of Software
NBIoT 2021   2nd International Conference on Networks, Blockchain and Internet of Things
ML4Music 2021   Special Issue: Machine Learning Applied to Music/Audio Signal Processing (Electronics)
IJITCS 2021   International Journal of Information Technology Convergence and services
Identifying Deep Fakes 2021   Deep Learning Algorithms and Techniques to Identify Deepfakes
CIoT 2021   3rd International Conference on Internet of Things
NOCS 2021   International Symposium on Networks-on-Chip (NOCS) 2021 Call for Papers
ENASE 2021   16th International Conference on Evaluation of Novel Approaches to Software Engineering