Workshop on Security and Privacy Intricacies in Resource Constrained Computing Environments (INTRICATE-SEC 2018), Krakow, Poland (May 16-18, 2018) .


Call for Papers ...


Previous editions of this workshop appear under "Intricate-Sec".

This edition of Intricate-Sec is centered on Resource Constrained Computing and will be held in conjunction with the 32nd IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA-2018). Computing under resource constraints is a relatively new field in computer science, in which we seek to develop solutions that are viable in terms of performance. Application examples emerge in rural/remote developing world regions where access to computational resources and in-house human capital (in terms of specialised expertise) is impeded for economic reasons. In such cases, it makes sense to seek cost-effective alternatives to deploying Internet services. Typical solution models rely on mobile phones, and lossy communication networks as a cost effective approach to service delivery. Using a trusted centralised framework for service delivery is not always feasible in these cases, and so distributed management offers a viable alternative. Distributed management however, raises concerns centered around subversion whereby in contrast to standard adversarial models, the malicious party seeks to mask attacks as faults with the goal of gaining some advantage without necessarily provoking a breakdown of the communication network. While seemingly harmless on initial level, when conducted over an extended period and by multiple parties, such attacks can result in unreliable and untrustworthy performance.

Topics...

In this workshop, we are especially interested in papers discussing various facets of resource constrained computing (RCC) networks and systems, from the perspective of Security, Privacy, Reliability, and Performance. Topics include, but are not limited to the following:

  • Authentication and Authorization for RCC Systems
  • Anonymity on RCC Systems
  • Applications of Cryptography to RCC Systems
  • Combating Fake News, Phishing, Spoofing, and Spam in RCC Systems
  • Distributed Denial of Service in RCC Networks
  • Fault Tolerance on RCC Networks
  • Identity Management Models on RCC Networks
  • Intrusion Detection and Response on RCC Networks
  • Studies/Experiences on Social Media and Micro-targeting on RCC Networks
  • Studies/Experiences on Social Media and Fake News on RCC Networks
  • Privacy Enhancing Methodologies for RCC Systems
  • Privacy Preserving Data Publishing on RCC Networks
  • Privacy Preserving Data Analytics on RCC Systems
  • Pseudonymity on RCC Systems
  • Tracking and Profiling on RCC Networks
  • Trust Management Models for RCC Systems

Program Committee

  • Christoph Meinel (HPI Germany)
  • Anne Kayem (HPI, Germany)
  • Stephen Marsh (University of Ontario Institute of Technology, Canada)
  • Cristina Alcaraz (University of Malaga, Spain)
  • Zeyar Aung (Masdar Institute of Science and Technology, UAE)
  • Dieter Hutter (DFKI GmbH, Germany)
  • Zekeriya Erkin (Delft University of Technology, Netherlands)
  • Ingo Stengel (University of Applied Sciences Karlsruhe, Germany)
  • George Yee (Carleton University, Canada)
  • Stephen Wolthusen (Royal Holloway, University of London, UK & Norwegian University of Science and Technology, Norway)

Submission Procedure

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings. Duplications or overlap with other published or submitted papers will be considered as grounds for rejection.

Papers should be submitted in Portable Document Format (PDF) only, edited using the two-column CPS Proceedings style, and may not be longer than 6 pages (including references and appendices). Templates are available at the IEEE authors' portal. All submissions must be made on the Easychair site. Accepted papers will appear in the INTRICATE-SEC proceedings published by IEEE Conference Publishing Services (CPS). At least one author of each accepted paper must register and attend the INTRICATE-SEC 2017 workshop in person to present the paper.

Important Dates...

  • Abstract: December 3, 2017
  • Submission: December 15, 2017
  • Notification: January 25, 2018
  • Camera ready: February 16, 2018

Have a question? .

Please drop us a line...(Email: anne{at}mykayem.org)