[Fwd: [Tccc] CFP: WSPWN06]
-------- Original Message -------- Subject: [Tccc] CFP: WSPWN06 Date: Wed, 2 Nov 2005 08:34:40 -0500 From: Kami Makki kmakki@eng.utoledo.edu To: Tccc@cs.columbia.edu
CALL FOR PAPERS (paper submission deadline: November 11, 2005) http://www.lasr.cs.ucla.edu/wspwn06
Hyatt Regency Hotel, Miami, Florida
International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN06) In conjunction with the Applied Electromagnetic Computational Society Meeting
March 15-16, 2006
Our computing world becomes increasingly wireless and mobile, while simultaneously we face greater threats to our security and privacy. In addition to inheriting most of the security and privacy problems of the standard networked environment, the special characteristics of the mobile and wireless environments introduce new challenges that have only begun to be studied. It is vital that researchers and developers investigate and address these new challenges before they have a chance to cripple the promise of the mobile wireless future. To that end, the International Workshop on Research Challenges in Mobile and Wireless Security and Privacy will bring together leading researchers and developers in the security and privacy fields to study the special problems and challenges of the mobile and wireless environments. The goal of the workshop is to foster communication not only between the different security and privacy communities, but also between those communities and the distributed systems and information systems communities. Such collaboration is vital to achieve a high degree of security and privacy, without which the use and safety of mobile and wireless computing will be limited.
Scope: ---------- The objective of the workshop is to define and establish a common infrastructure of the discipline and to develop a consensus-based document that will provide a foundation for implementation, standardization, and further research. The workshop will identify and define fundamental concepts and techniques, resolve conflicts between certain approaches in the area and provide a common ground for advanced research and development in security and privacy, concentrating on the special challenges of the mobile and wireless environments. The topics that will be addressed include, but are not limited to, the following, all as they pertain to the mobile and wireless environment:
* Security issues in wireless LANs * Security issues in wireless Internet * Special security issues for mobile devices * Location privacy * Security issues in ubiquitous and pervasive computing * Security in wireless ad hoc networks * Mobile IP security * Wireless communication security * Trust and privacy issues in mobile environments * New vulnerabilities in wireless and mobile environments * New threats to privacy in wireless and mobile environments * Cryptology in mobile and wireless applications * Denial of service attacks in mobile and wireless environments * Intrusion detection systems for mobile and wireless environments * Security issues in Web services for mobile and wireless environments * Security issues in electronic mail in mobile and wireless environments * Firewalls and VPNs for mobile and wireless environments * Privacy leakage in mobile and wireless environments * Authentication and authorization protocols for mobile and wireless environments * Privacy-enhancing technologies for mobile and wireless environments * Privacy and policy issues in mobile and wireless environments * Access control in mobile and wireless environments * Electronic commerce security for mobile and wireless environments
Workshop Format: ------------------- The workshop format will encourage productive interaction among participants. It will consist of the presentation of position papers and invited papers on new developments and current trends, with ample time allocated for group discussions. This format should provide a forum for collaborations to develop among members of the different research and development communities. Attendance will be limited and attendants will be asked to contribute to a consensus-based paper on security and privacy to be published after the workshop.
Submission: ------------ Authors are invited to submit position papers discussing issues in the mobile and wireless networks security and privacy that must be addressed to achieve consensus. Position papers that challenge existing ideas in mobile and wireless networks security and privacy with new research, technologies and visionary applications are also encouraged. Position papers should be between 10 and 25 pages in length, and should include the title, author(s), authors' affiliation and an abstract. Submitters should also indicate their willingness to contribute to the final report. Electronic submission is strongly encouraged. If electronic submission is not possible, five (5) hard copies of the paper should be sent. Contact information for both forms of submission is provided below. The accepted papers will be distributed to the participants prior to the workshop and will also appear in print together with the consensus paper after the workshop.
Important Dates: ----------------- Paper submission deadline: November 11, 2005 Notification of acceptance: December 16, 2005 Camera ready due: February 10, 2006 Workshop: March 15, 2006
Workshop Organizer --------------- Kia Makki, Florida International University
General Co-Chairs: --------------- Kia Makki, Florida International University Niki Pissinou, Florida International University
Technical Program Co-Chairs: --------------- Peter Reiher, UCLA Kami (Sam) Makki, University of Toledo
Program Committee: --------------- Ehab Al-Shaer, DePaul University John Baras, University of Maryland Bharat Bhargarva, Purdue University Mike Burmeister, Florida State University Senad Busovaca, California State University, Sacramento Roy Campbell, University of Illinois, Urbana Champaign Christos Douligeris, University of Piraeus, Greece Virgil Gligor, University of Maryland Parviz Kermani, IBM Watson Jiejun Kong, UCLA Birgitta Koenig-Ries, Karlsruhe University Wenke Lee, Georgia Tech Xuan Liu, IBM Watson Jelena Mirkovic, University of Delaware Wuxu Peng, Texas State University Adrian Perrig, Carnegie Mellon University Frank Seliger, IBM Pervasive Computing, Germany Mani Srivastava, UCLA Weili Wu, University of Texas at Dallas Yelena Yesha, University of Maryland, Baltimore County Yongguang Zhang, HRL Labs
Contact Information: --------------------- Peter Reiher 3564 Boelter Hall UCLA 405 Hilgard Ave. Los Angeles, CA 90095 (310) 825-8332 reiher@cs.ucla.edu ---------------------------------------- _______________________________________________ Tccc mailing list Tccc@cs.columbia.edu http://lists.cs.columbia.edu/mailman/listinfo/tccc
participants (1)
-
Lars Wolf