以文本方式查看主题

-  中文XML论坛 - 专业的XML技术讨论区  (http://bbs.xml.org.cn/index.asp)
--  『 XML安全 』  (http://bbs.xml.org.cn/list.asp?boardid=27)
----  CFP: International Workshop on Security and Privacy for Mobile and Wireless Networks  (http://bbs.xml.org.cn/dispbbs.asp?boardid=27&rootid=&id=25028)


--  作者:admin
--  发布时间:12/6/2005 9:31:00 AM

--  CFP: International Workshop on Security and Privacy for Mobile and Wireless Networks
CFP: International Workshop on Security and Privacy for Mobile and Wireless Networks   
   
Kami Makki  <kmakki@eng.utoledo.edu>  
  More options   8:11 am (1 hour ago)

(paper submission extended - deadline: December 16, 2005)
http://www.lasr.cs.ucla.edu/wspwn06

Hyatt Regency Hotel, Miami, Florida

International Workshop on Research Challenges in
Security and Privacy for Mobile and Wireless Networks (WSPWN06)
In conjunction with the Applied Electromagnetic Computational Society
Meeting

March 15-16, 2006

Our computing world becomes increasingly wireless and mobile, while
simultaneously we face greater threats to our security and privacy.  In
addition to inheriting most of the security and privacy problems of the
standard networked environment, the special characteristics of the mobile
and wireless environments introduce new challenges that have only begun to
be studied.  It is vital that researchers and developers investigate and
address these new challenges before they have a chance to cripple the
promise of the mobile wireless future.
To that end, the International Workshop on Research Challenges in Mobile
and Wireless Security and Privacy will bring together leading researchers
and developers in the security and privacy fields to study the special
problems and challenges of the mobile and wireless environments. The goal
of the workshop is to foster communication not only between the different
security and privacy communities, but also between those communities and
the distributed systems and information systems communities. Such
collaboration is vital to achieve a high degree of security and privacy,
without which the use and safety of mobile and wireless computing will be
limited.

Scope:
----------
The objective of the workshop is to define and establish a common
infrastructure of the discipline and to develop a consensus-based document
that will provide a foundation for implementation, standardization, and
further research. The workshop will identify and define fundamental
concepts and techniques, resolve conflicts between certain approaches in
the area and provide a common ground for advanced research and development
in security and privacy, concentrating on the special challenges of the
mobile and wireless environments. The topics that will be addressed
include, but are not limited to, the following, all as they pertain to the
mobile and wireless environment:

* Security issues in wireless LANs
* Security issues in wireless Internet
* Special security issues for mobile devices
* Location privacy
* Security issues in ubiquitous and pervasive computing
* Security in wireless ad hoc networks
* Mobile IP security
* Wireless communication security
* Trust and privacy issues in mobile environments
* New vulnerabilities in wireless and mobile environments
* New threats to privacy in wireless and mobile environments
* Cryptology in mobile and wireless applications
* Denial of service attacks in mobile and wireless environments
* Intrusion detection systems for mobile and wireless environments
* Security issues in Web services for mobile and wireless environments
* Security issues in electronic mail in mobile and wireless environments
* Firewalls and VPNs for mobile and wireless environments
* Privacy leakage in mobile and wireless environments
* Authentication and authorization protocols for mobile and wireless
environments
* Privacy-enhancing technologies for mobile and wireless environments
* Privacy and policy issues in mobile and wireless environments
* Access control in mobile and wireless environments
* Electronic commerce security for mobile and wireless environments


Workshop Format:
-------------------
The workshop format will encourage productive interaction among
participants. It will consist of the presentation of position papers and
invited papers on new developments and current trends, with ample time
allocated for group discussions. This format should provide a forum for
collaborations to develop among members of the different research and
development communities. Attendance will be limited and attendants will be
asked to contribute to a consensus-based paper on security and privacy to
be published after the workshop.


Submission:
------------
Authors are invited to submit position papers discussing issues in the
mobile and wireless networks security and privacy that must be addressed to
achieve consensus. Position papers that challenge existing ideas in mobile
and wireless networks security and privacy with new research, technologies
and visionary applications are also encouraged. Position papers should be
between 10 and 25 pages in length, and should include the title, author(s),
authors' affiliation and an abstract. Submitters should also indicate their
willingness to contribute to the final report. Electronic submission is
strongly encouraged. If electronic submission is not possible, five (5)
hard copies of the paper should be sent. Contact information for both forms
of submission is provided below. The accepted papers will be distributed to
the participants prior to the workshop and will also appear in print
together with the consensus paper after the workshop.

Important Dates:
-----------------
Paper submission deadline: December 16,  2005
Notification of acceptance: January 16, 2005
Camera ready due: February 10, 2006
Workshop: March 15-16, 2006

Honorary Workshop Chair:
---------------
Joseph B. Evans, National Science Foundation

General Co-Chairs:
---------------
Kia  Makki, Florida International University
Niki Pissinou, Florida International University

Technical Program Co-Chairs:
---------------
Peter Reiher, UCLA
Kami (Sam) Makki, University of Toledo

International Vice-Chairs:
---------------
Xiaohua Jia, City University of Hong Kong
Mohsen Guizani, Western Michigan University

Finance Co-Chairs:
-------------------
E. K. Park, University of Missouri, Kansas City
Senad Busovaca, California State University, Sacramento

Program Committee:
---------------
Ehab Al-Shaer, DePaul University
John Baras, University of Maryland
Bharat Bhargarva, Purdue University
Mike Burmeister, Florida State University
Senad Busovaca, California State University, Sacramento
Roy Campbell, University of Illinois, Urbana Champaign
Christos Douligeris, University of Piraeus, Greece
Yuguang "Michael" Fang, University of Florida
Ophir Frieder, Illinois Institute of Technology
Virgil Gligor, University of Maryland
Parviz Kermani, IBM Watson
Jiejun Kong, UCLA
Birgitta Koenig-Ries, Karlsruhe University
Wenke Lee, Georgia Tech
Xuan Liu, IBM Watson
Jelena Mirkovic, University of Delaware
Wuxu Peng, Texas State University
Adrian Perrig, Carnegie Mellon University
Frank Seliger, IBM Pervasive Computing, Germany
Mani Srivastava, UCLA
Peng-Jun Wan, Illinois Institute of Technilogy
Weili Wu, University of Texas at Dallas
Jie Wu, Florida Atlantic University
Guoliang Xue, Arizona State University
Yuanyuan Yang, State University of New York, Stony Brook
Yelena Yesha, University of Maryland, Baltimore County
Yongguang Zhang, HRL Labs

Contact Information:
---------------------
Peter Reiher
3564 Boelter Hall
UCLA
405 Hilgard Ave.
Los Angeles, CA 90095
(310) 825-8332
reiher@cs.ucla.edu


W 3 C h i n a ( since 2003 ) 旗 下 站 点
苏ICP备05006046号《全国人大常委会关于维护互联网安全的决定》《计算机信息网络国际联网安全保护管理办法》
4,015.625ms