您现在的位置: 首页 - 学院新闻 - 正文

The First International Workshop on Security of Ubiquitous Computing (SUC 2019)会议征稿

发表日期:2019-03-08 10:32:27 | 点击数:

The development of basic technologies such as network technology, computer technology and sensor technology has promoted the development of ubiquitous computing. The purpose of ubiquitous computing is to create an environment full of computing and communication capabilities, and to integrate this environment with people gradually. In this integration space, people can access digital services transparently at anytime and anywhere.

Ubiquitous computing environment is a mobile and distributed information system, which involves many kinds of networks and information technologies. While designing cryptographic primitives, access control models, security protocols and security systems, the characteristics of ubiquitous computing such as openness, cross-domain, mobility, environment awareness and limited resources should be taken into account.

  • This is the first SUC conference, and the purpose of this conference is to gather researchers and practitioners from academia and industry, to focus on discussing and identifying potential security risks and problems in Ubiquitous Computing, to classify them, and to summarize and exchange existing solutions. The expected outcomes are as follows:

  • Summarizing the trust management mechanism and access control scheme in ubiquitous computing.

  • Exploring privacy protection scheme in ubiquitous computing environment.

  • Envisaging the future research directions to solve the security problems of ubiquitous computing.

Topics of the Workshop

This workshop aims to be a forum for sharing security issues and solutions in ubiquitous computing. The main topics of the workshop are as follows (but not limited to):

  • Network Trust Management Based on User Identity

  • Data Transmission Security

  • Inter-device Access Control Based on Constrained Physical Range

  • Access Control in Distributed Computing Environment

  • Terminal Security in Ubiquitous Computing Environment

  • Privacy Protection Scheme for Ubiquitous Computing

  • System Security Scheme for Ubiquitous Computing

  • Data Storage Security in Ubiquitous Computing Networks

  • Security in Wireless Network and Mobile Systems

  • Security of IoT Systems

  • Security of Operation Systems

  • Computer Security

Important Dates

Feb 19th, 2019 (PST): Submission Deadline

April 26th, 2019 (PST): Submission Deadline   New

April 30th, 2019 (PST): Acceptance Notification

May 5th, 2019 (PST): Acceptance Notification   New

May 19th, 2019 (PST): Camera-ready Due

August 19th, 2019: Workshop Day

Organizers’ Background

1. Ji Xiang, Professor, Institute of Information Engineering, Chinese Academy of Sciences, China
Ji Xiang is a professor in Institute of Information Engineering, Chinese Academy of Sciences. He obtained his Ph.D. from Graduate University of Chinese Academy of Sciences in 2009. His research interests include Security and Privacy, Networking, and Big Data, and has published more than 40 papers in recent years, including top conference such as AAAI, ESORICS, ACSAC, AsiaCCS and so on.
Contact:Ji Xiang, xiangji@iie.ac.cn

2. Daren Zha, Senior Engineer, Institute of Information Engineering, Chinese Academy of Sciences, China
Daren Zha received his Ph.D. degree in Information Security from Graduate University of Chinese Academy of Sciences. Now he is a Senior Engineer in Institute of Information Engineering, Chinese Academy of Sciences. His research interests include Applied Cryptography, Data Security and Privacy, Network and System Security, and intelligent analysis of big data, and has published more than 20 papers in recent years, including Chinese Journal of Electronics, ISPEC, TrustCom and so on.
3. Zheng Zhang, Professor, JinLing Institute of Technology, China
Zheng Zhang is now a full professor at JinLing Institute of Technology, Dean of School of Software Engineering and School of Cyber Security. His research concerns computer network security and wireless communication security. He presided over and participated in a number of major ministerial-level scientific research projects in China. In 2004 and 2010, he won the second prize of China's National Science and Technology Progress Award(2nd and 1st respectively), 5 times won the China Ministerial Science and Technology Progress Award. He was selected as Young and Middle Aged Leader in Jiang Su Province and Young and Middle Aged Expert with outstanding contributions in Nanjing.
4. Le Guan, Assistant Professor, University of Georgia, USA
Le Guan is an assistant professor in the department of computer science at the University of Georgia (UGA). Prior to joining UGA, he was a post-doc at Penn State supervised by Prof. Peng Liu. He received a PhD from the Institute of Information Engineering, Chinese Academy of Sciences in 2015, and a BS degree from the University of Science and Technology of China in 2009. His research interests cover many topics in the field of systems security, including operating systems, mobile systems, and IoT systems. He specialized in leveraging COTS hardware components/features to design and build systems that are more reliable and secure than solutions based on software alone. He is also interesting in security problems with the low-cost micro-controller systems. He has published papers in IEEE S&P, NDSS, MobiSys, SenSys, ACSAC, RAID, and TDSC.

Invited PC Members

Neng Gao, Institute of Information Engineering, Chinese Academy of Sciences, China

Lei Wang, Institute of Information Engineering, Chinese Academy of Sciences, China

Min Zuo, Beijing Technology and Business University, China

Shui Yu,  University of Technology Sydney, Australia

Zheng Yao, University of Chinese Academy of Sciences, China

Chen Cao, Pennsylvania State University, USA

Ying Zhao, Beijing University of Chemical Technology, China

Kaiping Xue, University of Science and Technology of China, China

Zhenhua Ling, University of Science and Technology of China, China

Paper Submission

Submissions must not exceed 6 pages (including references). Authors should avoid the use of non-English fonts to avoid problems with printing and viewing the submissions. All manuscripts should be formatted in the IEEE Computer Society Proceedings Format , and submitted in the Portable Document Format (.pdf).  

All papers should be submitted via the conferences’ EDAS system. Authors should register with the EDAS system first, and then make the submission via the conference link https://edas.info/N25463 from which you can navigate to your workshop. Make sure you select the right workshop for your paper.

Publication

All accepted papers will be published by IEEE CPS (IEEE-DL and EI indexed). At least one author of each accepted paper is required to register and present their work at the conference; otherwise the paper will not be included in the proceedings. Selected papers will be recommended to journal special issues such as IJGHPC https://www.igi-global.com/journal/international-journal-grid-high-performance/1105. More details can be found via http://www.smart-world.org/2019/ .

版权所有:437必赢会员中心(中国)股份有限公司-官方网站 地址:南京市江宁区弘景大道99号 邮编:211169 电话:025-86188709 E-mail:rjxy@jit.edu.cn