posted by user: STM_events || 4528 views || tracked by 3 users: [display]

Chip-to-Cloud Security Forum 2012 : Chip-to-Cloud Security Forum

FacebookTwitterLinkedInGoogle

Link: http://www.chip-to-cloud.com
 
When Sep 19, 2012 - Sep 20, 2012
Where Nice, French Riviera
Submission Deadline Mar 23, 2012
Notification Due Apr 30, 2012
Final Version Due Aug 31, 2012
Categories    secure embedded systems techno   trusted mobile comm. & transac   internet of things
 

Call For Papers

Call for Papers

Chip-to-Cloud Security Forum
Smart Trusted Technologies & Services for the Networked Society
http://www.chip-to-cloud.com


BACKGROUND & SCOPE
The Chip-to-Cloud Security Forum is the continuation of Smart Event, combining together Smart Mobility, e-Smart and partly World e-ID conferences into a wide-ranging single event dedicated to the Future Networked Society security.
For 12 years, Smart Event has addressed Academic and Industry key advances in Smart Security. Starting from purely embedded and smart cards security, then adding mobile and biometrics applications, Smart Event has gradually enlarged its scope to cover a larger "digital security domain" including trusted applications in telecoms, Internet, banking, e-gov., etc. Along with the continuously increasing performance of the nano-, micro- technologies and the cheaper and faster modern communication networks, every physical resource now form part of massive infrastructures supporting on-line services such as M2M, Mobile Internet, Mobile Payments, Cloud Computing Applications & Services, Social Networks... This shift from off-line secure personal devices (mostly embedded secure microcontrollers and smart cards) based transactions to mobile and on-line trusted services is reflected by the new title Chip-to-Cloud Security Forum.
Taking a step forward, those connected services announce a near future best described by the Internet of Things (IoT) design paradigm: a smart environment where devices, sensors, actuators, mobile phones, etc. are able to interact with each other and cooperate through the Internet. This perspective raises new security, trust and privacy challenges at unseen levels, impacting the digital world in all its components, from the "things" to users' everyday life, from the physical space to the society. The Chip-to-Cloud Security Forum will also address these IoT's broad security challenges arising from our Networked Society.

OBJECTIVES
The Forum offers a high level international conference for researchers from Academia, Industry experts and engineers, Industry decision-makers, practitioners from standardization bodies and government professionals to share their vision, to figure out strategies for the future, to point out business opportunities and seek collaboration prospects, to present state-of-the-art research and discuss the most recent advances in embedded, mobile and cloud security at both hardware and software levels with regards to the dynamics of these technologies towards the Internet of Things challenges.
The Chip-to-Cloud Forum Program Committee is looking for technical papers describing original ideas groundbreaking results, new techniques, new methodologies, proposing new research directions, highlighting standardization and regulatory issues for resolving open problems spanning from all aspects of current and future IoT systems security and trust ability.
Reinforcing the interactions between academic research and Industry:
In order to reinforce the interactions between academic research and Industry, the Chip-to-Cloud Security Forum Program Committee is also looking for Industry specific papers preferably focusing on:
- academic research challenges resulting from the industry context,
- the design, implementation, deployment and use cases of realistic systems that have been built and deployed,
- the engineering challenges faced by the Industry in a commercial context and versus business opportunities, success stories and/or failures.

LIST OF TOPICS
The submissions may address one or more of the topics mentioned below or others that authors believe to be of great interest to the audience.

SECURE EMBEDDED SYSTEMS TECHNOLOGIES
- Secure embedded systems design:
- Advanced architectures
- Secure HW/SW co-specification
- Formal verification
- HW/SW co-validation
- System validation
- Run-time & design time reconfigurable secure platforms & processors
- Multiple constraints driven embedded systems design & optimization
- Secure hardware technologies
- Secure software architectures & engineering
- Secure embedded software & OS
- Advances in ubiquitous and domain specific cryptography, PUFs, etc.
- Strong authentication technologies (HW& SW) for Cloud Computing, Services Security and other Enterprise and personal usages.
- Advances in embedded Java & Java Card
- NFC and contactless technologies security
- (Mobile) Trusted Computing architectures
- Packaging issues & innovations

TRUSTED MOBILE COMMUNICATIONS & TRANSACTIONS
- Advances in Secure Element technologies: USIM/UICC, embedded SIM, SD card
- TEE in mobile devices
- Smart card web server
- Trusted Services Management technologies
- Smartphone's security: device, OS and secure mobile apps development
- Contactless/wireless /mobile systems security risks analysis
- Advances in NFC and contactless technology
- Electronic Identity security:
- Biometrics advances & applications
- e-ID domain specific cryptography
- e-ID based secure applications
- Privacy protection
- Mobile Internet, Mobile and cloud computing
- Trusted mobile services
- Use cases and deployments of m-payment, transportation, media & content applications
- Smart mobility research projects such as impaired and handicapped people, location-aware apps, smart cities, etc.
- Innovative business models between MNOs/ Service Providers/Banks/Other Stakeholders

TOWARDS
THE INTERNET OF THINGS
- Cloud Computing Security, Security as a Service (SaaS)
- M2M Deployment & Security
- M2M applications to:
- Transportation, automotive,
- Smart grids/meter,
- SCADA system,
- Smart physical infrastructure,
- Energy efficiency,
- Environmental monitoring, medical devices, telematics and robotics...
- LTE and mobile broadband security issues
- Mobility in enterprise security management
- Cyber Physical Systems and Cyber Physical Society security issues
- Wireless Sensor Networks (WSNs) and Advanced Wireless Sensors
- Wireless Personal Area Networks technologies (UWB, 6LoWPan, etc.)
- Wireless Body Area Networks

HORIZONTAL CONTRIBUTIONS:
- Standardization issues & progresses for increasing trust and interoperability
- Security, privacy and content protection: standardization issues & progresses, security evaluations methodologies (attacks & countermeasures, best practices, etc.), certifications criteria and schemes
- Products and systems security evaluation and certification standards
- Transnational collaborative R&D frameworks, initiatives and programs
- Transnational regulatory issues & progresses to make the internet and services infrastructures more trustable and secure.

Related Resources

SOCC 2024   37th IEEE International System-on-Chip Conference
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
SPIE-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex
17th IEEE MCSoC 2024   17th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip
COMIT 2024   8th International Conference on Computer Science and Information Technology
Philosophical Approaches to Games and Ga 2024   Call For Papers - Philosophical Approaches to Games and Gamification: Ethical, Aesthetic, Technological and Political Perspectives
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
IJP2P 2024   International Journal of Peer-to-Peer networks
DataMod 2024   12th International Symposium DataMod 2024: From Data to Models and Back