Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL) Rome, Italy - October 2-5, 2012 |
Home | Call for Papers [txt] | Committees | Important dates | Submissions | Program | Registration [txt] |
The special track on Security and Privacy of the ESTEL Conference aims at providing a forum for discussing security and privacy issues that need to be investigated for providing advanced services, architectures, and technologies for space and satellite applications. In this context, it is of utmost importance to ensure proper protection to such complex systems, or systems-of-systems, to ensure security, privacy, and availability of the infrastructure as well as of resources and information it provides and manages. These aspects concern both the specific satellite application and infrastructure as well as the base stations and land data servers and communications that serve them, touching then the different areas with ICT. The problem is far from trivial, due to the criticality and the social impact of the applications and services relying on this global infrastructure, as well as the complexity given by the co-existence and co-operation of, possibly heterogeneous, component systems. Topics of interest include, but are not limited to:
Access Control | Secure Cloud Computing |
Applied Cryptography for Space Applications | Secure Software Development Methodologies |
Authentication | Security Protocols |
Biometrics Security and Privacy | Security and Privacy in Mobile Systems |
Data Integrity | Security and Privacy in Complex Systems |
Data Protection | Security and Privacy in IT Outsourcing |
Database Security and Privacy | Security and Privacy in Location-based Services |
Digital Forensics | Security and Privacy in Pervasive/Ubiquitous Computing |
Digital Rights Management | Security and Privacy in Satellite Surveillance |
Ethical and Legal Implications of Security and Privacy | Security and Privacy in Web Services |
Formal Methods for Security | Security and Privacy Policies |
Homeland Security | Security Area Control |
Human Factors and Human Behaviour Recognition Techniques | Security Deployment |
Identification, Authentication and Non-repudiation | Security Engineering |
Identity Management | Security for Grid Computing |
Information Hiding | Security in Distributed Systems |
Information Systems Auditing | Security Information Systems Architecture and Design and Security Patterns |
Insider Threats and Countermeasures | Security in e-Healthcare |
Intellectual Property Protection | Security Issues of Satellite Communications |
Intrusion Detection & Prevention | Security Management |
Management of Computing Security | Security Metrics and Measurement |
Organizational Security Policies | Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) |
Peer-to-Peer Security | Security Verification and Validation |
Privacy | Sensor and Mobile Ad Hoc Network Security |
Privacy Enhancing Technologies | Service and Systems Design and QoS Network Security |
Reliability and Dependability | Software Security |
Risk Assessment | Trust Management and Reputation Systems |
Satellite-based Disaster Recovery | Ubiquitous Computing Security |
Satellite Network Security | Wireless Network Security |