The 1st International Workshop on the Emerging Future Internet and
Network Security (EFINS 2014) Beijing, China on 24-26 September,
2014 in
conjunction with The 13th
IEEE International Conference on Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom-2014) https://www.greenorbs.org/TrustCom2014/index.htm All accepted papers will be included
in the IEEE TrustCom-14 main proceedings (Indexed by EI) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Mahdi Aiash (M.Aiash@mdx.ac.uk) Jonathan Loo (J.Loo@mdx.ac.uk) School of Science and Technology, Middlesex University, UK
|
Our experience of the Internet as an unsecure environment is mainly due to the fact that security has not been taken into consideration earlier in the design stage; security protocols and mechanisms are adds-on to the TCP/IP suit and they have always been devised as reactions to attacks. Learning from the lessons of the Internet, research in Future Networks should view security as a key part of the network architecture and consider to integrate security at the design stage. The fact that Future Networks introduce novel communication models which are different from the Internet’s model implies that current security mechanisms and protocols might not be appropriate for or compatible with the new communication models. Therefore, modifications to current mechanisms or even new security approaches have to be considered. In addition to the security threats found in the current Internet, Future Networks will have to deal with new threats. A key challenge here is how to integrate security into system without compromising the flexibility, dynamics and ubiquity of Future Networks. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The International Workshop on the Emerging Future Internet and
Network Security is intended to bring forth the recent advancements in these
areas; it invites original contributions on emerging internetworking and
communication models with an emphasis on Security, Privacy and Trust in
issues in these models. Topics of interest includes but not limited to: o
Accountability verses anonymity and privacy o
Application level trust, privacy and security o
Architectures related to trust, privacy and security o
Authentication, Authorization and Accounting (AAA) for
future networks o
Cross-layer security o
Key management issue and solutions o
Identity management o
Privacy, anonymity and traceability o
Threat and vulnerability analysis for future networks o Trust technologies, technologies for building trust in future networks |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Paper submission deadline: June 10, 2014
Workshop date: TBC |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
All Papers should be submitted electronically in PDF format through EasyChair system. The materials presented in the papers should not be published or under submission elsewhere. Each paper is limited to 8 pages (or 10 pages with over length charge) including figures and references using IEEE CS Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You can confirm the IEEE CS Proceedings Author Guidelines at the following web page: https://www.computer.org/portal/web/cscps/formatting. Accepted papers will be included in the TrustCom2014 main proceedings (indexed by EI). At least one author of each accepted paper must be registered for the conference in order for that paper to appear in the proceedings and to be scheduled for presentation. For submission-related questions, please contact workshop chairs. |