Call For Papers INTRICATE-SEC 2017

12 september 2016

5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services (INTRICATE-SEC 2017) Important Dates:

  • Oct. 1, 2016: Abstract
  • Oct. 15, 2016: Full Paper Submission
  • Dec. 20, 2016: Accept/Reject Notification Jan. 20, 2016: Camera Ready SubmissionCyber-physical systems (CPS) are ubiquitous in critical infrastructures such as electrical power generation, transmission, and distribution networks, water management, and transportation, but also in both industrial and home automation. For flexibility, convenience, and efficiency, CPS are increasingly supported by commodity hardware and software components that are deliberately interconnected using open standard general purpose information and communication technology (ICT).

The long life-cycles of CPS and increasingly incremental changes to these systems require novel approaches to the composition and inter-operability of services provided. The paradigm of service-oriented architectures (SoA) has successfully been used in similar long-lived and heterogeneous software systems. However, adapting the SoA paradigm to the CPS domain requires maintaining the security, reliability and privacy properties not only of the individual components but also, for complex interactions and service orchestrations that may not even exist during the initial design and deployment of an architecture.

An important consideration therefore is the design and analysis of security mechanisms and architectures able to handle cross domain inter-operability over multiple domains involving components with highly heterogeneous capabilities. The INTRICATE-SEC workshop aims to provide a platform for academics, industry, and government professionals to communicate and exchange ideas on provisioning secure CPS and Services.

We seek contributions focused on (but not limited to) the following topics:

  • Anonymity and Pseudonymity
  • Trust and Identity Management
  • Authentication and Authorization
  • Access Control Models
  • Key Management, Applied Cryptographic Protocols/Schemes
  • Privacy
  • Malware Detection
  • Phishing and Spam
  • Trust and Identity Management
  • Demand Management
  • Scheduling
  • Energy Management and Marketing Models
  • Cloud Security
  • Attack Models
  • Scalability, Reliability and Safety
  • Intrusion Detection and Response
  • Legal and Regulatory Issues
  • Vulnerability Analysis and Countermeasures
  • Web Applications and Services
  • Unconventional or Biologically Inspired Security Approaches

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings. Duplication or overlap with other published or submitted papers will be considered as grounds for rejection.

Papers should be submitted in Portable Document Format (PDF) only, edited using the two-column CPS Proceedings style, and may not be longer than 6 pages (including references and appendices).

Templates are available at the IEEE authors' portal. All submissions must be made on the Easychair site. Accepted papers will appear in the INTRICATE-SEC proceedings published by IEEE Conference Publishing Services (CPS). At least one author of each accepted paper must register and attend the INTRICATE-SEC 2017 workshop in person to present the paper.