[Fwd: [Tccc] CFP: Security for Mobile Networks in ACM Mobility 2010 Conference]
-------- Original-Nachricht -------- Betreff: [Tccc] CFP: Security for Mobile Networks in ACM Mobility 2010 Conference Datum: Tue, 8 Dec 2009 18:06:30 -0000 Von: Lei SHU lei.shu@live.ie An: tccc@lists.cs.columbia.edu Referenzen: 4B1D99A1020000C8000203FE@GW15.hofstra.edu
================================== ACM Mobility 2010 Conference
Jeju Island, Korea, August 30 - September 1, 2010
http://www.acmmobility2010.org/ ==================================
Special Session
Security for Mobile Networks
==================================
CHAIRPERSONS
Lei Shu Nishio Lab., Department of Multimedia Engineering, Graduate School of Information Science and Technology Osaka University, Japan E-mail: lei.shu@ieee.org
Weiwei Yuan UC Lab, Department of Computer Engineering, Kyung Hee University, Korea E-mail: weiwei@oslab.khu.ac.kr
Donghai Guan UC Lab, Department of Computer Engineering, Kyung Hee University, Korea E-mail: donghai@oslab.khu.ac.kr
SYNOPSIS
With the rapid development and the increasing complexity of the mobile communications, traditional security technologies and measures can not meet the demand for integrated and dynamic security solutions. The unique characteristics of mobile networks pose a number of challenges in terms of security, such as trust establishment, key management, privacy and anonymity. This special section aims to identify and explore the different issues and challenges related to security aspects in mobile networks. What are the benefits or inconvenience of mobility on security? What are the appropriate mobility models to have a good level of security? Are Classical IDS approaches appropriate for mobile environments? How can we build up trusted platforms and trustworthy systems for mobile networks?
This special session will be held in conjunction with ACM Mobility Conference 2009, an ideal vehicle for bringing together researchers, scientists, engineers, academics and students all around the world to share the latest updates on new mobile technologies that would shape the next generation of mobile systems and technology platforms. We are interested in the areas, but are not limited to, the following topics:
Submission Topics
1. Trust management in mobile networks 2. Risk management in mobile networks 3. Privacy in mobile networks 4. Cryptographic devices for mobile networks 5. Key management in mobile networks 6. Authentication in mobile networks 7. Access control in mobile networks 8. Anonymity in mobile networks 9. Reliability and fault tolerance in mobile networks 10. Secure mobile routing protocols 11. Security under resource constraints 12. Performance and security trade-offs in mobile networks 13. Intrusion detection in mobile networks 14. Secure mobile location services 15. Denial of service in mobile networks
Please take note of the important deadlines:
Papers Submission: 19 April 2010 Notification of Acceptance of Paper: 24 May 2010 Full papers Submission Deadline: 28 June 2010 Author Early Registration Deadline: 05 July 2010 Conference: 30 August - 1 September 2010
Lei SHU
participants (1)
-
Lars Wolf