Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy - October 2-5, 2012

Home |  Call for Papers  [txt] |  Committees |  Important dates |  Submissions |  Program   |  Registration  [txt

The special track on Security and Privacy of the ESTEL Conference aims at providing a forum for discussing security and privacy issues that need to be investigated for providing advanced services, architectures, and technologies for space and satellite applications. In this context, it is of utmost importance to ensure proper protection to such complex systems, or systems-of-systems, to ensure security, privacy, and availability of the infrastructure as well as of resources and information it provides and manages. These aspects concern both the specific satellite application and infrastructure as well as the base stations and land data servers and communications that serve them, touching then the different areas with ICT. The problem is far from trivial, due to the criticality and the social impact of the applications and services relying on this global infrastructure, as well as the complexity given by the co-existence and co-operation of, possibly heterogeneous, component systems. Topics of interest include, but are not limited to:

Access Control Secure Cloud Computing
Applied Cryptography for Space Applications Secure Software Development Methodologies
Authentication Security Protocols
Biometrics Security and Privacy Security and Privacy in Mobile Systems
Data Integrity Security and Privacy in Complex Systems
Data Protection Security and Privacy in IT Outsourcing
Database Security and Privacy Security and Privacy in Location-based Services
Digital Forensics Security and Privacy in Pervasive/Ubiquitous Computing
Digital Rights Management Security and Privacy in Satellite Surveillance
Ethical and Legal Implications of Security and Privacy Security and Privacy in Web Services
Formal Methods for Security Security and Privacy Policies
Homeland Security Security Area Control
Human Factors and Human Behaviour Recognition Techniques Security Deployment
Identification, Authentication and Non-repudiation Security Engineering
Identity Management Security for Grid Computing
Information Hiding Security in Distributed Systems
Information Systems Auditing Security Information Systems Architecture and Design and Security Patterns
Insider Threats and Countermeasures Security in e-Healthcare
Intellectual Property Protection Security Issues of Satellite Communications
Intrusion Detection & Prevention Security Management
Management of Computing Security Security Metrics and Measurement
Organizational Security Policies Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
Peer-to-Peer Security Security Verification and Validation
Privacy Sensor and Mobile Ad Hoc Network Security
Privacy Enhancing Technologies Service and Systems Design and QoS Network Security
Reliability and Dependability Software Security
Risk Assessment Trust Management and Reputation Systems
Satellite-based Disaster Recovery Ubiquitous Computing Security
Satellite Network Security Wireless Network Security

If you have any question, please contact the Special Track Program Chair at