Difference between revisions of "Asset:Current events"
(→CALL FOR PARTICIPATION) |
(→CALL FOR PARTICIPATION) |
||
Line 20: | Line 20: | ||
− | Security and Privacy Threats in IoT Architectures D. Kozlov, J. Veijalainen and Y. Ali University of Jyväskylä, Finland | + | Security and Privacy Threats in IoT Architectures, D. Kozlov, J. Veijalainen and Y. Ali University of Jyväskylä, Finland |
− | Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications R. M. Savola, H. Abie and M. Sihvonen VTT Finland | + | Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications, R. M. Savola, H. Abie and M. Sihvonen VTT Finland |
Line 29: | Line 29: | ||
− | Risk-Based Adaptive Security for Smart IoT in eHealth H. Abie and I Balasingham Norwegian Computing Center, Norway | + | Risk-Based Adaptive Security for Smart IoT in eHealth, H. Abie and I Balasingham Norwegian Computing Center, Norway |
− | Managing Access Control for Things: a Capability Based Approach D. Rotondi and S. Piccione TxT e-solutions S.p.A., Italy | + | Managing Access Control for Things: a Capability Based Approach, D. Rotondi and S. Piccione TxT e-solutions S.p.A., Italy |
Revision as of 09:37, 11 September 2012
CALL FOR PARTICIPATION
"*******************************************************************************************"
Workshop on Security Tools and Techniques for Internet of Things (SeTTIT 2012)
Oslo, Norway -- September 26, 2012
http://settit.bodynets.org/2012/show/home
"********************************************************************************************"
Experts from science and industry will discuss new insights from work in progress, technological and scientific breakthroughs and practical aspects of securing the Internet of Things (IoT). Take part in the discussion of protection tools and techniques for the IoT!
Technical program:
Keynote speech : Information Management Challenges in a context-aware Internet of Things Towards a Healthy You, Prof. Stefan Poslad, Queen Mary University of London, UK
Security and Privacy Threats in IoT Architectures, D. Kozlov, J. Veijalainen and Y. Ali University of Jyväskylä, Finland
Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications, R. M. Savola, H. Abie and M. Sihvonen VTT Finland
Keynote speech : Game Theory and Trust Models for the Internet of Things, Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
Risk-Based Adaptive Security for Smart IoT in eHealth, H. Abie and I Balasingham Norwegian Computing Center, Norway
Managing Access Control for Things: a Capability Based Approach, D. Rotondi and S. Piccione TxT e-solutions S.p.A., Italy
Subjects of the workshop include:
- Definition of accurate metrics to assess the threats and the risks associated to IoT for e-health
- Identification and description of new attack scenarios that are specific to IoT architectures
- Investigation of the security properties that should be fulfilled by the transmission of patient data across body area networks
- Monitoring the security level of the e-health applications relying on IoT
- Analyzing the results of experiments conducted using real patient data and studying the security performance of the associated architectures
SeTTIT 2012 will be held in conjunction with BodyNets 2012. For the program and all information about the workshop schedule, directions and your stay in Oslo please visit:
http://bodynets.org/2012/show/home
We are looking forward to inspiring discussions with you about our security of the IoT!
WORKSHOP CHAIRS
Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
Dr. Habtamu Abie, Norwegian Computing Center, Norway