Difference between revisions of "Events"

From Asset
Jump to: navigation, search
(Created page with "= Special Issue on Adaptive Security for IoT = *[http://asset.nr.no/asset/index.php/Special_Issue_on_Adaptive_Security_for_IoT Call For Papers: Special Issue on Adaptive Secur...")
 
Line 1: Line 1:
 +
= 2nd International Workshop on Measurability of Security in Software Architectures =
 +
[http://asset.nr.no/asset/index.php/MeSSa2014 2nd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 8th European Conference on Software Architecture (ECSA 2014), August 25, 2014, in Vienna, Austria]
 +
 +
 
= Special Issue on Adaptive Security for IoT =
 
= Special Issue on Adaptive Security for IoT =
 
*[http://asset.nr.no/asset/index.php/Special_Issue_on_Adaptive_Security_for_IoT Call For Papers: Special Issue on Adaptive Security for IoT]of [http://www.emeraldinsight.com/products/journals/journals.htm?id=ijpcc International Journal of Pervasive computing and Communications (IJPCC)]
 
*[http://asset.nr.no/asset/index.php/Special_Issue_on_Adaptive_Security_for_IoT Call For Papers: Special Issue on Adaptive Security for IoT]of [http://www.emeraldinsight.com/products/journals/journals.htm?id=ijpcc International Journal of Pervasive computing and Communications (IJPCC)]

Revision as of 07:08, 28 April 2014

2nd International Workshop on Measurability of Security in Software Architectures

2nd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 8th European Conference on Software Architecture (ECSA 2014), August 25, 2014, in Vienna, Austria


Special Issue on Adaptive Security for IoT

4 Master's Theses Available in the ASSET Project

ASSET Project

The ASSET project is a cooperation project between NR, Gjøvik University College (GUC), Oslo University Hospital (OUH) and international partners, and is financed by The Research Council of Norway in the VERDIKT program. The project is in the process of building and optimizing light-weight abilities in Smart Things that will allow them to detect in real-time unknown security and privacy threats, and respond and adapt to them. In this connection the following concrete topics for three master's theses are available. The candidates are required to register in the Norwegian Universities' master's program.

Topics for four master's theses

1. Design, deploy, and use an accurate energy-monitoring system for body-sensor networks. The goal is to have a dashboard depicting information about the residual energy of the sensor nodes and their expected lifetime. Electronic instrumentation skills are required for this task.

2. Hardware implementation of lightweight encryption/signature algorithms on sensor boards. This allows consistent delay reduction and energy saving since the encryption routines will be executed in assembly. FPGA (Field-programmable gate array) and VHDL (VHSIC Hardware Description Language) skills are required for this task.

3. Software implementation of game theoretic models for the estimation and prediction of unknown threats and analysis of their impacts. This allows accurate security risk impact assessment in order to estimate and predict risk damages and future benefits. Security decisions should therefore be adapted according to those estimates and predictions. Mathematics and programming in Matlab and C++ (preferably on Linux OS) skills are required for this task.

The project is in advanced stage establishing and validating critical working parameters for adaptive security for a concrete IoT-based patient monitoring system in both home and hospital scenarios. In this connection the following concrete topic for a master's thesis is available. The candidate is required to register in the master's program of one of the Norwegian Universities.

4. Analysis and Validation of Critical Parameters for Adaptive Security in eHealth. The goal is to study and answer the following three questions applying the DELPHI study method:

  • (i) What is the acceptable "minimal deviations from normal operation" in security adaptation at various levels of adaptation?
  • (ii) How do we "enable adaptation across multiple time scales" and what are the acceptable time scales?
  • (iii) Where and how much risk do we accept to take, and are risk damages possible to control?

Skills required for this task are DELPHI study (http://is.njit.edu/pubs/delphibook/), content analysis, categories and coding rules, and good English written communication.


We provide possibilities of publishing results in international conferences/journals

Contact

Habtamu Abie, Principal Investigator and Project Manager

Tel:(+47) 22852595

Email: Habtamu.Abie@nr.no


International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013)

International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013) held in conjunction with UbiComp 2013, September 8-12, 2013, in Zurich, Switzerland

Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013

Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013 co-located with the BodyNets 2013 Conference sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET
Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013.

Call For Papers SeTTIT 2013 in PDF

Local Sponsors

ResearchCouncilofNorway.gif

Asset logo.png