Articles

Track 2: Security

Print

 

The Security Track will address all the security aspects of design, implementation, deployment, architectures and modeling of heterogeneous wired and wireless computer networks, of  virtualization technology, as well as of  pervasive computer applications. It will also provide dynamic forums for researchers, students and professionals to present their research results and development in these areas and will offer the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to information and system security.

Topic areas of interest of this track include, but are not limited to the following:

Thematic areas:

 

  • Security engineering. Methodologies, formalisms, modeling, tools, code instrumentation ....
  • Cryptography. Algorithms, protocols, attacks...
  • Security in distributed systems.
  • Cryptographic Hardware and Embedded Systems.
  • Light-weight cryptography.
  • Information Hiding. Steganography ...
  • Privacy and Anonymity.
  • Security assurance. Evaluation, testing, formal proofs, certification.
  • Quantum Cryptography and QKD.
  • Trusted computing. Analyses and attacks, practical applications...
  • Surveillance and monitoring. Intrusion detection, monitoring techniques, architectures,...
  • Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...
  • Social and psychological aspects of security. User-centered security evaluation, perception of security and threats...
  • Security and usability.

 

Application areas:

 

  • Service Oriented Computing. Platform security, access control, Security of the SOC processes (Negotiation, Orchestration), Identification of services...
  • Cloud computing. Platform security, data protection, software protection, surveillance and dynamic reaction.
  • Ubiquitous computing, pervasive computing and ambient intelligence. Secure system models, development support, dynamic reaction, self-* systems
  • Embedded systems. Dynamic replaceability, system security assessment, secure system composition, tampering-resistance...
  • Security in system evolution. Design for secure evolution, evolution-oriented surveillance, security patches...
  • Critical infrastructures. Protection architectures, redundancy and replication, scalability issues...

Security Program co–chairs

  • George Spanoudakis – The City University, United Kingdom
  • Andrew Marrington – Zayed University, UAE
  • Farkhund Iqbal – Zayed University, UAE

Security TPC members

Givenname Surname Affiliation Country
Habtamu Abie Norwegian Computing Center Norway
Claudio Ardagna Università degli Studi di Milano Italy
Carlo Blundo University of Salerno Italy
Jacek Cichoń Wroclaw University of Technology Poland
Jorge Cuellar Siemens AG Germany
Roberto Di Pietro Università di Roma Tre Italy
Tassos Dimitriou Athens Information Technology Greece
Eduardo Fernandez Florida Atlantic University USA
Marcin Gogolewski Adam Mickiewicz University Poland
Dimitris Gritzalis Athens University of Economics and Business Greece
Sigrid Guergens Fraunhofer Institute for Secure Information Technology Germany
Farkhund Iqbal Zayed University UAE
Kevin Jones City University London United Kingdom
Jan Jürjens TU Dortmund & Fraunhofer ISST Germany
Stamatis Karnouskos SAP Germany
Sokratis Katsikas University of Piraeus Greece
Hristo Koshutanski University of Malaga Spain
Lukasz Krzywiecki Wroclaw University of Technology Poland
Bogdan Ksiezopolski Maria Curie-Sklodowska University Poland
Przemyslaw Kubiak Wroclaw University of Technology Poland
Costas Lambrinoudakis University of Piraeus Greece
Maryline Laurent Institut Mines-Télécom, Télécom SudParis France
Volkmar Lotz SAP AG France
Antonio Maña University of Malaga Spain
Andrew Marrington Zayed University UAE
Fabio Martinelli CNR-IIT Italy
Gregorio Martinez Perez University of Murcia Spain
Antonio Muñoz-Gallego University of Malaga Spain
David Naccache ENS France
Raphael Phan Loughborough University United Kingdom
Reinhard Posch TU Graz Austria
Joachim Posegga Institute of IT-Security and Security Law Germany
Jean-Jacques Quisquater Université Catholique De Louvain Belgium
Stefan Rass Alpen-Adria Universitaet Klagenfurt Austria
Carsten Rudolph Fraunhofer SIT Germany
Jose Fran. Ruiz Fraunhofer SIT Germany
Erkay Savas Sabanci University Turkey
Daniel Serrano Hanjin Shipping Spain
Jun Shao Zhejiang Gongshang University P.R. China
Harry Skianis University of the Aegean Greece
Nicolas Sklavos Technological Educational Institute of Western Greece Greece
Agusti Solanas Rovira i Virgili University Spain
Pedro Soria-Rodriguez Atos Spain
George Spanoudakis City University London United Kingdom
Said Huwida Zayed University UAE
Andreas Wespi IBM Zurich Research Laboratory Switzerland
Friday the 28th. | Sixth IFIP International Conference on New Technologies, Mobility & Security (NTMS 2014) - www.ntms-conf.org
Pwd by Coupons for Hostgator