| |||||||||||||||
Chip-to-Cloud Security Forum 2012 : Chip-to-Cloud Security Forum | |||||||||||||||
Link: http://www.chip-to-cloud.com | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
Chip-to-Cloud Security Forum Smart Trusted Technologies & Services for the Networked Society http://www.chip-to-cloud.com BACKGROUND & SCOPE The Chip-to-Cloud Security Forum is the continuation of Smart Event, combining together Smart Mobility, e-Smart and partly World e-ID conferences into a wide-ranging single event dedicated to the Future Networked Society security. For 12 years, Smart Event has addressed Academic and Industry key advances in Smart Security. Starting from purely embedded and smart cards security, then adding mobile and biometrics applications, Smart Event has gradually enlarged its scope to cover a larger "digital security domain" including trusted applications in telecoms, Internet, banking, e-gov., etc. Along with the continuously increasing performance of the nano-, micro- technologies and the cheaper and faster modern communication networks, every physical resource now form part of massive infrastructures supporting on-line services such as M2M, Mobile Internet, Mobile Payments, Cloud Computing Applications & Services, Social Networks... This shift from off-line secure personal devices (mostly embedded secure microcontrollers and smart cards) based transactions to mobile and on-line trusted services is reflected by the new title Chip-to-Cloud Security Forum. Taking a step forward, those connected services announce a near future best described by the Internet of Things (IoT) design paradigm: a smart environment where devices, sensors, actuators, mobile phones, etc. are able to interact with each other and cooperate through the Internet. This perspective raises new security, trust and privacy challenges at unseen levels, impacting the digital world in all its components, from the "things" to users' everyday life, from the physical space to the society. The Chip-to-Cloud Security Forum will also address these IoT's broad security challenges arising from our Networked Society. OBJECTIVES The Forum offers a high level international conference for researchers from Academia, Industry experts and engineers, Industry decision-makers, practitioners from standardization bodies and government professionals to share their vision, to figure out strategies for the future, to point out business opportunities and seek collaboration prospects, to present state-of-the-art research and discuss the most recent advances in embedded, mobile and cloud security at both hardware and software levels with regards to the dynamics of these technologies towards the Internet of Things challenges. The Chip-to-Cloud Forum Program Committee is looking for technical papers describing original ideas groundbreaking results, new techniques, new methodologies, proposing new research directions, highlighting standardization and regulatory issues for resolving open problems spanning from all aspects of current and future IoT systems security and trust ability. Reinforcing the interactions between academic research and Industry: In order to reinforce the interactions between academic research and Industry, the Chip-to-Cloud Security Forum Program Committee is also looking for Industry specific papers preferably focusing on: - academic research challenges resulting from the industry context, - the design, implementation, deployment and use cases of realistic systems that have been built and deployed, - the engineering challenges faced by the Industry in a commercial context and versus business opportunities, success stories and/or failures. LIST OF TOPICS The submissions may address one or more of the topics mentioned below or others that authors believe to be of great interest to the audience. SECURE EMBEDDED SYSTEMS TECHNOLOGIES - Secure embedded systems design: - Advanced architectures - Secure HW/SW co-specification - Formal verification - HW/SW co-validation - System validation - Run-time & design time reconfigurable secure platforms & processors - Multiple constraints driven embedded systems design & optimization - Secure hardware technologies - Secure software architectures & engineering - Secure embedded software & OS - Advances in ubiquitous and domain specific cryptography, PUFs, etc. - Strong authentication technologies (HW& SW) for Cloud Computing, Services Security and other Enterprise and personal usages. - Advances in embedded Java & Java Card - NFC and contactless technologies security - (Mobile) Trusted Computing architectures - Packaging issues & innovations TRUSTED MOBILE COMMUNICATIONS & TRANSACTIONS - Advances in Secure Element technologies: USIM/UICC, embedded SIM, SD card - TEE in mobile devices - Smart card web server - Trusted Services Management technologies - Smartphone's security: device, OS and secure mobile apps development - Contactless/wireless /mobile systems security risks analysis - Advances in NFC and contactless technology - Electronic Identity security: - Biometrics advances & applications - e-ID domain specific cryptography - e-ID based secure applications - Privacy protection - Mobile Internet, Mobile and cloud computing - Trusted mobile services - Use cases and deployments of m-payment, transportation, media & content applications - Smart mobility research projects such as impaired and handicapped people, location-aware apps, smart cities, etc. - Innovative business models between MNOs/ Service Providers/Banks/Other Stakeholders TOWARDS THE INTERNET OF THINGS - Cloud Computing Security, Security as a Service (SaaS) - M2M Deployment & Security - M2M applications to: - Transportation, automotive, - Smart grids/meter, - SCADA system, - Smart physical infrastructure, - Energy efficiency, - Environmental monitoring, medical devices, telematics and robotics... - LTE and mobile broadband security issues - Mobility in enterprise security management - Cyber Physical Systems and Cyber Physical Society security issues - Wireless Sensor Networks (WSNs) and Advanced Wireless Sensors - Wireless Personal Area Networks technologies (UWB, 6LoWPan, etc.) - Wireless Body Area Networks HORIZONTAL CONTRIBUTIONS: - Standardization issues & progresses for increasing trust and interoperability - Security, privacy and content protection: standardization issues & progresses, security evaluations methodologies (attacks & countermeasures, best practices, etc.), certifications criteria and schemes - Products and systems security evaluation and certification standards - Transnational collaborative R&D frameworks, initiatives and programs - Transnational regulatory issues & progresses to make the internet and services infrastructures more trustable and secure. |
|