Deprecated: Non-static method JApplicationSite::getMenu() should not be called statically, assuming $this from incompatible context in /home/boostwor/public_html/ntms-2015/templates/milanoconsultants/index.php on line 41

Deprecated: Non-static method JApplicationCms::getMenu() should not be called statically, assuming $this from incompatible context in /home/boostwor/public_html/ntms-2015/libraries/cms/application/site.php on line 279
Track 2: Security

The Security Track will address all the security aspects of design, implementation, deployment, architectures and modeling of heterogeneous wired and wireless computer networks, of  virtualization technology, as well as of  pervasive computer applications. It will also provide dynamic forums for researchers, students and professionals to present their research results and development in these areas and will offer the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to information and system security.

Topic areas of interest of this track include, but are not limited to the following:

Thematic areas:

 

  • Security engineering. Methodologies, formalisms, modeling, tools, code instrumentation ....
  • Cryptography. Algorithms, protocols, attacks...
  • Security in distributed systems.
  • Cryptographic Hardware and Embedded Systems.
  • Light-weight cryptography.
  • Information Hiding. Steganography ...
  • Privacy and Anonymity.
  • Security assurance. Evaluation, testing, formal proofs, certification.
  • Quantum Cryptography and QKD.
  • Trusted computing. Analyses and attacks, practical applications...
  • Surveillance and monitoring. Intrusion detection, monitoring techniques, architectures,...
  • Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...
  • Social and psychological aspects of security. User-centered security evaluation, perception of security and threats...
  • Security and usability.

 

Application areas:

 

  • Service Oriented Computing. Platform security, access control, Security of the SOC processes (Negotiation, Orchestration), Identification of services...
  • Cloud computing. Platform security, data protection, software protection, surveillance and dynamic reaction.
  • Ubiquitous computing, pervasive computing and ambient intelligence. Secure system models, development support, dynamic reaction, self-* systems
  • Embedded systems. Dynamic replaceability, system security assessment, secure system composition, tampering-resistance...
  • Security in system evolution. Design for secure evolution, evolution-oriented surveillance, security patches...
  • Critical infrastructures. Protection architectures, redundancy and replication, scalability issues...

 

 Security TPC

Habtamu

Abie

Norwegian Computing Center

Claudio

Ardagna

Università degli Studi di Milano

Mohamad

Badra

CNRS

Jorge

Cuellar

Siemens AG

Roberto

Di Pietro

Bell Labs

Tassos

Dimitriou

Computer Technology Institute in Greece and Kuwait University

Eduardo

Fernandez

Florida Atlantic University

Felix

Gomez Marmol

NEC Laboratories Europe

Jan

Jürjens

TU Dortmund & Fraunhofer ISST

Stamatis

Karnouskos

SAP Research

Sokratis

Katsikas

University of Piraeus

Hristo

Koshutanski

University of Malaga

Lukasz

Krzywiecki

Wroclaw University of Technology

Bogdan

Ksiezopolski

Maria Curie-Sklodowska University

Maryline

Laurent

Institut Mines-Télécom, Télécom SudParis

Fabio

Martinelli

CNR-IIT

Gregorio

Martinez Perez

University of Murcia

David

Naccache

ENS

Raphael

Phan

Loughborough University

Joachim

Posegga

Institute of IT-Security and Security Law

Jean-Jacques

Quisquater

Université Catholique De Louvain

Jose Fran.

Ruiz

University of Malaga

Pedro

Soria-Rodriguez

Atos

 Carlo 

Blundo 

 Università degli Studi di Salerno

Nicolas 

Sklavos

University of Patras, Greece

 

twitter share

Contact Us

We welcome your comments and proposals (workshops, keynotes, tutotials, demo sessions ...) at:

email contact@ntms-conf.org

© 2017 New Technologies, Mobility & Security (NTMS 2015)
Joomla Templated by joomzilla.com
Back to Top