Difference between revisions of "ASPI 2013 Completion"
(→The successful completion of the ASPI 2013 Workshop) |
(→The Successful Completion of the ASPI 2013 Workshop) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | = The | + | = The Successful Completion of the ASPI 2013 Workshop = |
The ASPI 2013 (International Workshop on Adaptive Security & Privacy Management for the Internet of Things 2013) in conjunction with the 15th ACM International Conference on Ubiquitous Computing (UbiComp2013] concluded on Sunday September 8, 2013, Zurich, Switzerland. The workshop featured 2 keynote speeches and 7 regular papers. The program of the workshop was as follows: | The ASPI 2013 (International Workshop on Adaptive Security & Privacy Management for the Internet of Things 2013) in conjunction with the 15th ACM International Conference on Ubiquitous Computing (UbiComp2013] concluded on Sunday September 8, 2013, Zurich, Switzerland. The workshop featured 2 keynote speeches and 7 regular papers. The program of the workshop was as follows: | ||
Line 17: | Line 17: | ||
*''Trusted Tiny Things: Making Internet of Things More Transparent to Users (E. Pignotti, P. Edwards'') | *''Trusted Tiny Things: Making Internet of Things More Transparent to Users (E. Pignotti, P. Edwards'') | ||
− | *''Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management (R. Savola, H. Abie'' | + | *[[Media:ASPI2013_Savola_Abie.pdf|''Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management (R. Savola, H. Abie)'']] |
'''''Session 3: Security implementation issues in the IoT''', Chair Dr. Stefan Poslad'' | '''''Session 3: Security implementation issues in the IoT''', Chair Dr. Stefan Poslad'' | ||
Line 61: | Line 61: | ||
==Sponsors== | ==Sponsors== | ||
− | [[Image:ResearchCouncilofNorway.gif|left]] | + | [[Image:ResearchCouncilofNorway.gif|400px|left]] |
[[Image:Asset_logo.png|100px]] | [[Image:Asset_logo.png|100px]] |
Latest revision as of 07:11, 25 September 2013
The Successful Completion of the ASPI 2013 Workshop
The ASPI 2013 (International Workshop on Adaptive Security & Privacy Management for the Internet of Things 2013) in conjunction with the 15th ACM International Conference on Ubiquitous Computing (UbiComp2013] concluded on Sunday September 8, 2013, Zurich, Switzerland. The workshop featured 2 keynote speeches and 7 regular papers. The program of the workshop was as follows:
- Welcome & Introduction to the Workshop, Dr. Stefan Poslad
Keynote speech: Let us Develop a Secure IoT Environment, Peter Mueller, IBM Zurich
Session 1: Resilient & Transparent Security Schemes for the IoT, Chair Dr. Mohamed Hamdi
- 6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer (K-F Krentz)
- Delay Sensitive Distributed Sensor Data Exchange for an IoT (R. Tao, S. Poslad)
Keynote speech: Towards Adaptive Risk Management for the IoT, Dr. Mohamed Hamdi, Sup'Com
Session 2: Trust, Metrics and Adaptive Security Approaches for the IoT, Chair Dr. Habtamu Abie
- Trusted Tiny Things: Making Internet of Things More Transparent to Users (E. Pignotti, P. Edwards)
- Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management (R. Savola, H. Abie)
Session 3: Security implementation issues in the IoT, Chair Dr. Stefan Poslad
- Lightweight Security Vehicle Tracking System Using CoAP (A. Ukil, S. Bandyopadhyay, A. Bhattacharyya, A. Pal)
- Secure Cooperative Physical-layer Coding for the Internet of Things (M. Hamdi)
- A Testbed for Adaptive Security for IoT in eHealth (Y. B. Woldegeorgis, H. Abie, M. Hamdi)
- Closing remarks and discussion (S. Poslad)
The first keynote speech, "Let’s Develop a Secure IoT Environment" by Peter Mueller has focussed on one of the absolutely critical aspects within the IoT environment – Security whose functions and attributes are required at every level, from a tiny sensor device ranging up to a high performance data center on a backbone. Today’s new requirements regarding technology, policies and standards were reviewed, and some conjectures were given on where advanced security might take us and the IoT in the future.
The second keynote speech, "Towards Adaptive Risk Management for the IoT" by Dr. Mohamed Hamdi has addressed the application of risk management methodologies and risk analysis processes to the IoT. The intrinsic features of the IoT have first been underlined. Then, the shortcomings of the traditional frameworks to address these specific needs have been discussed. Particularly, the need for real-time reactivity and the support of a dynamic context have been emphasized. Several new methodologies, protocols, and algorithms that have been recently developed to apply adaptive security to the IoT have been reviewed. Finally, some open issues were highlighted.
The seven regular papers,
- 6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer by K-F Krentz et al.
- Delay Sensitive Distributed Sensor Data Exchange for an IoT by R. Tao,and S. Poslad
- Trusted Tiny Things: Making Internet of Things More Transparent to Users by E. Pignotti and P. Edwards
- Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management by R. Savola and H. Abie
- Lightweight Security Vehicle Tracking System Using CoAP by A. Ukil, S. Bandyopadhyay, A. Bhattacharyya, and A. Pal
- Secure Cooperative Physical-layer Coding for the Internet of Things by M. Hamdi
- A Testbed for Adaptive Security for IoT in eHealth by Y. B. Woldegeorgis, H. Abie, and M. Hamdi
Workshop Chairs
Dr. Stefan Poslad, School of Electonic Engineering and Computer Science, Queen Mary University of London
Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
Dr. Habtamu Abie, Norwegian Computing Center, Norway