|
|
(7 intermediate revisions by the same user not shown) |
Line 1: |
Line 1: |
− | = Special Issue on Adaptive Security for IoT of IJPCC<br/> =
| |
− | <p style="text-align: center"></p><p style="text-align: center"><span style="font-size:larger">'''Call For Papers: Special Issue on Adaptive Security for IoT'''</span></p><p style="text-align: center"><span style="font-size:larger">'''International Journal of Pervasive computing and Communications (IJPCC)'''</span></p><p style="text-align: center"><span style="font-size:larger">'''([http://www.emeraldinsight.com/products/journals/journals.htm?id=ijpcc http://www.emeraldinsight.com/products/journals/journals.htm?id=ijpcc]).'''</span></p>
| |
− | Several significant challenges should be addressed to fulfil the Internet of Things (IoT) vision, including security and privacy. The Internet is already under continuous threats and the addition of many additional types of devices and interaction will open new security breaches so as to spark new malicious actions. Security and privacy for the IoT remains a core challenge. The proposed special issue intends to publish ongoing research for the security and privacy models, protocols, algorithms, context-awareness for security, and devices that can be implemented in the IoT. A specific focus is on the need for IoT security and privacy to adapt to changing contexts. Areas of interest for this special issue include, but not limited to, the following topics for IoT:
| |
− |
| |
− | - Methods for adaptive security and privacy
| |
− |
| |
− | - Context reasoning, fusion, transformation, inferencing, and actuating for adaptive security and privacy
| |
− |
| |
− | - Identity management issues including biometrics and behavioural analysis
| |
− |
| |
− | - Privacy Enhanced Technologies (PET) and reducing the effect of Privacy-Invasive Technologies (PIT)
| |
− |
| |
− | - User surveillance via smart environment devices
| |
− |
| |
− | - Lightweight and low energy cryptosystems for secure ubiquitous computing
| |
− |
| |
− | - Protecting unattended devices to be tamper-proof, tamper-resistant or tamper-evident
| |
− |
| |
− | - Implementing practical test-beds that allow the analysis of the security performance of BANs
| |
− |
| |
− | - Vulnerabilities, threats, models and their validation
| |
− |
| |
− | - Fault-tolerant, resilient, and transparent IoT architectures
| |
− |
| |
− | - Analytics and predictive models for adaptive security
| |
− |
| |
− | - Adaptive risk management and security decision-making models for IoT
| |
− |
| |
− | - Game theoretic models for adaptive security for IoT
| |
− |
| |
− | - Trust, metrics and adaptive security approaches for the IoT
| |
− |
| |
− |
| |
− |
| |
− | '''Important Dates:'''
| |
− |
| |
− | - '''Manuscript Submission Due: January 05, 2014'''
| |
− |
| |
− | - Acceptance Notification: '''February 15, 2014'''
| |
− |
| |
− | - Final Manuscripts Submissions Due: '''March 13, 2014'''
| |
− |
| |
− | - Publication: '''April 2014 special issue'''
| |
− |
| |
− |
| |
− |
| |
− | '''Submission Information:'''
| |
− |
| |
− | Only original and unpublished research papers will be considered in this journal. Manuscripts must be written in English. All submissions will be reviewed based on technical merit and relevance. All submissions are made using ScholarOne Manuscripts, the online submission and peer review system, [http://mc.manuscriptcentral.com/ijpcc http://mc.manuscriptcentral.com/ijpcc]. Instructions for authors and submissions can be found at [http://msc.emeraldinsight.com/ http://msc.emeraldinsight.com/]
| |
− |
| |
− |
| |
− |
| |
− | '''Editorials:'''
| |
− |
| |
− | '''Editor-in-Chief:''' Ismail Khalil, Institute of Telecooperation, Johannes Kepler University, Linz, Austria
| |
− |
| |
− | '''Special issue Guest Editors:'''
| |
− |
| |
− | *Stefan Poslad, , Queen Mary University of London, UK, [[Stefan@eecs.qmul.ac.uk]]
| |
− | *Mohamed Hamdi, University of Carthage, Tunisia, [[Mmh@supcom.rnu.tn]]
| |
− | *Habtamu Abie. Norwegian Computing Center, Norway, [mailto:habtamu.abie@nr.no habtamu.abie@nr.no]
| |
− | <p style="text-align: center"></p>
| |
− |
| |
| = International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013) = | | = International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013) = |
| | | |