Difference between revisions of "Asset:Current events"

From Asset
Jump to: navigation, search
(CALL FOR PARTICIPATION)
(CALL FOR PARTICIPATION)
Line 1: Line 1:
 
=CALL FOR PARTICIPATION=
 
=CALL FOR PARTICIPATION=
"*********************************************************************************"
+
"*******************************************************************************************"
  
 
'''Workshop on Security Tools and Techniques for Internet of Things (SeTTIT 2012)'''
 
'''Workshop on Security Tools and Techniques for Internet of Things (SeTTIT 2012)'''
Line 8: Line 8:
 
http://settit.bodynets.org/2012/show/home
 
http://settit.bodynets.org/2012/show/home
  
"*********************************************************************************"
+
"********************************************************************************************"
  
 
   
 
   
 
Experts from science and industry will discuss new insights from work in progress, technological and scientific breakthroughs and practical aspects of securing the Internet of Things (IoT). Take part in the discussion of protection tools and techniques for the IoT!  
 
Experts from science and industry will discuss new insights from work in progress, technological and scientific breakthroughs and practical aspects of securing the Internet of Things (IoT). Take part in the discussion of protection tools and techniques for the IoT!  
 +
  
 
'''Technical program:'''
 
'''Technical program:'''
Line 36: Line 37:
  
 
- Definition of accurate metrics to assess the threats and the risks associated to IoT for e-health
 
- Definition of accurate metrics to assess the threats and the risks associated to IoT for e-health
 +
 
- Identification and description of new attack scenarios that are specific to IoT architectures
 
- Identification and description of new attack scenarios that are specific to IoT architectures
 +
 
- Investigation of the security properties that should be fulfilled by the transmission of patient data across body area networks
 
- Investigation of the security properties that should be fulfilled by the transmission of patient data across body area networks
 +
 
- Monitoring the security level of the e-health applications relying on IoT
 
- Monitoring the security level of the e-health applications relying on IoT
 +
 
- Analyzing the results of experiments conducted using real patient data and studying the security performance of the associated architectures
 
- Analyzing the results of experiments conducted using real patient data and studying the security performance of the associated architectures
 +
  
  

Revision as of 10:27, 11 September 2012

CALL FOR PARTICIPATION

"*******************************************************************************************"

Workshop on Security Tools and Techniques for Internet of Things (SeTTIT 2012)

Oslo, Norway -- September 26, 2012

http://settit.bodynets.org/2012/show/home

"********************************************************************************************"


Experts from science and industry will discuss new insights from work in progress, technological and scientific breakthroughs and practical aspects of securing the Internet of Things (IoT). Take part in the discussion of protection tools and techniques for the IoT!


Technical program:

Keynote speech : Information Management Challenges in a context-aware Internet of Things Towards a Healthy You, Prof. Stefan Poslad, Queen Mary University of London, UK


Security and Privacy Threats in IoT Architectures D. Kozlov, J. Veijalainen and Y. Ali University of Jyväskylä, Finland


Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications R. M. Savola, H. Abie and M. Sihvonen VTT Finland


Keynote speech : Game Theory and Trust Models for the Internet of Things, Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia


Risk-Based Adaptive Security for Smart IoT in eHealth H. Abie and I Balasingham Norwegian Computing Center, Norway


Managing Access Control for Things: a Capability Based Approach D. Rotondi and S. Piccione TxT e-solutions S.p.A., Italy


Subjects of the conference include:

- Definition of accurate metrics to assess the threats and the risks associated to IoT for e-health

- Identification and description of new attack scenarios that are specific to IoT architectures

- Investigation of the security properties that should be fulfilled by the transmission of patient data across body area networks

- Monitoring the security level of the e-health applications relying on IoT

- Analyzing the results of experiments conducted using real patient data and studying the security performance of the associated architectures


SeTTIT 2012 will be held in conjunction with BodyNets 2012. For the program and all information about the workshop schedule, directions and your stay in Oslo please visit:

http://bodynets.org/2012/show/home


We are looking forward to inspiring discussions with you about our security of the IoT!


WORKSHOP CHAIRS Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia Dr. Habtamu Abie, Norwegian Computing Center, Norway