新书推介:《语义网技术体系》
作者:瞿裕忠,胡伟,程龚
   >>中国XML论坛<<     W3CHINA.ORG讨论区     计算机科学论坛     SOAChina论坛     Blog     开放翻译计划     新浪微博  
 
  • 首页
  • 登录
  • 注册
  • 软件下载
  • 资料下载
  • 核心成员
  • 帮助
  •   Add to Google

    >> XML与数字内容安全(DRM,XrML,RDD, MPEG-21, XACML), XML传输的安全, 基于XML的签名,基于XML的加密
    [返回] 中文XML论坛 - 专业的XML技术讨论区XML.ORG.CN讨论区 - 高级XML应用『 XML安全 』 → CFP: International Workshop on Security and Privacy for Mobile and Wireless Networks 查看新帖用户列表

      发表一个新主题  发表一个新投票  回复主题  (订阅本版) 您是本帖的第 12451 个阅读者浏览上一篇主题  刷新本主题   树形显示贴子 浏览下一篇主题
     * 贴子主题: CFP: International Workshop on Security and Privacy for Mobile and Wireless Networks 举报  打印  推荐  IE收藏夹 
       本主题类别:     
     admin 帅哥哟,离线,有人找我吗?
      
      
      
      威望:9
      头衔:W3China站长
      等级:计算机硕士学位(管理员)
      文章:5255
      积分:18406
      门派:W3CHINA.ORG
      注册:2003/10/5

    姓名:(无权查看)
    城市:(无权查看)
    院校:(无权查看)
    给admin发送一个短消息 把admin加入好友 查看admin的个人资料 搜索admin在『 XML安全 』的所有贴子 点击这里发送电邮给admin  访问admin的主页 引用回复这个贴子 回复这个贴子 查看admin的博客楼主
    发贴心情 CFP: International Workshop on Security and Privacy for Mobile and Wireless Networks

    CFP: International Workshop on Security and Privacy for Mobile and Wireless Networks   
       
    Kami Makki  <kmakki@eng.utoledo.edu>  
      More options   8:11 am (1 hour ago)

    (paper submission extended - deadline: December 16, 2005)
    http://www.lasr.cs.ucla.edu/wspwn06

    Hyatt Regency Hotel, Miami, Florida

    International Workshop on Research Challenges in
    Security and Privacy for Mobile and Wireless Networks (WSPWN06)
    In conjunction with the Applied Electromagnetic Computational Society
    Meeting

    March 15-16, 2006

    Our computing world becomes increasingly wireless and mobile, while
    simultaneously we face greater threats to our security and privacy.  In
    addition to inheriting most of the security and privacy problems of the
    standard networked environment, the special characteristics of the mobile
    and wireless environments introduce new challenges that have only begun to
    be studied.  It is vital that researchers and developers investigate and
    address these new challenges before they have a chance to cripple the
    promise of the mobile wireless future.
    To that end, the International Workshop on Research Challenges in Mobile
    and Wireless Security and Privacy will bring together leading researchers
    and developers in the security and privacy fields to study the special
    problems and challenges of the mobile and wireless environments. The goal
    of the workshop is to foster communication not only between the different
    security and privacy communities, but also between those communities and
    the distributed systems and information systems communities. Such
    collaboration is vital to achieve a high degree of security and privacy,
    without which the use and safety of mobile and wireless computing will be
    limited.

    Scope:
    ----------
    The objective of the workshop is to define and establish a common
    infrastructure of the discipline and to develop a consensus-based document
    that will provide a foundation for implementation, standardization, and
    further research. The workshop will identify and define fundamental
    concepts and techniques, resolve conflicts between certain approaches in
    the area and provide a common ground for advanced research and development
    in security and privacy, concentrating on the special challenges of the
    mobile and wireless environments. The topics that will be addressed
    include, but are not limited to, the following, all as they pertain to the
    mobile and wireless environment:

    * Security issues in wireless LANs
    * Security issues in wireless Internet
    * Special security issues for mobile devices
    * Location privacy
    * Security issues in ubiquitous and pervasive computing
    * Security in wireless ad hoc networks
    * Mobile IP security
    * Wireless communication security
    * Trust and privacy issues in mobile environments
    * New vulnerabilities in wireless and mobile environments
    * New threats to privacy in wireless and mobile environments
    * Cryptology in mobile and wireless applications
    * Denial of service attacks in mobile and wireless environments
    * Intrusion detection systems for mobile and wireless environments
    * Security issues in Web services for mobile and wireless environments
    * Security issues in electronic mail in mobile and wireless environments
    * Firewalls and VPNs for mobile and wireless environments
    * Privacy leakage in mobile and wireless environments
    * Authentication and authorization protocols for mobile and wireless
    environments
    * Privacy-enhancing technologies for mobile and wireless environments
    * Privacy and policy issues in mobile and wireless environments
    * Access control in mobile and wireless environments
    * Electronic commerce security for mobile and wireless environments


    Workshop Format:
    -------------------
    The workshop format will encourage productive interaction among
    participants. It will consist of the presentation of position papers and
    invited papers on new developments and current trends, with ample time
    allocated for group discussions. This format should provide a forum for
    collaborations to develop among members of the different research and
    development communities. Attendance will be limited and attendants will be
    asked to contribute to a consensus-based paper on security and privacy to
    be published after the workshop.


    Submission:
    ------------
    Authors are invited to submit position papers discussing issues in the
    mobile and wireless networks security and privacy that must be addressed to
    achieve consensus. Position papers that challenge existing ideas in mobile
    and wireless networks security and privacy with new research, technologies
    and visionary applications are also encouraged. Position papers should be
    between 10 and 25 pages in length, and should include the title, author(s),
    authors' affiliation and an abstract. Submitters should also indicate their
    willingness to contribute to the final report. Electronic submission is
    strongly encouraged. If electronic submission is not possible, five (5)
    hard copies of the paper should be sent. Contact information for both forms
    of submission is provided below. The accepted papers will be distributed to
    the participants prior to the workshop and will also appear in print
    together with the consensus paper after the workshop.

    Important Dates:
    -----------------
    Paper submission deadline: December 16,  2005
    Notification of acceptance: January 16, 2005
    Camera ready due: February 10, 2006
    Workshop: March 15-16, 2006

    Honorary Workshop Chair:
    ---------------
    Joseph B. Evans, National Science Foundation

    General Co-Chairs:
    ---------------
    Kia  Makki, Florida International University
    Niki Pissinou, Florida International University

    Technical Program Co-Chairs:
    ---------------
    Peter Reiher, UCLA
    Kami (Sam) Makki, University of Toledo

    International Vice-Chairs:
    ---------------
    Xiaohua Jia, City University of Hong Kong
    Mohsen Guizani, Western Michigan University

    Finance Co-Chairs:
    -------------------
    E. K. Park, University of Missouri, Kansas City
    Senad Busovaca, California State University, Sacramento

    Program Committee:
    ---------------
    Ehab Al-Shaer, DePaul University
    John Baras, University of Maryland
    Bharat Bhargarva, Purdue University
    Mike Burmeister, Florida State University
    Senad Busovaca, California State University, Sacramento
    Roy Campbell, University of Illinois, Urbana Champaign
    Christos Douligeris, University of Piraeus, Greece
    Yuguang "Michael" Fang, University of Florida
    Ophir Frieder, Illinois Institute of Technology
    Virgil Gligor, University of Maryland
    Parviz Kermani, IBM Watson
    Jiejun Kong, UCLA
    Birgitta Koenig-Ries, Karlsruhe University
    Wenke Lee, Georgia Tech
    Xuan Liu, IBM Watson
    Jelena Mirkovic, University of Delaware
    Wuxu Peng, Texas State University
    Adrian Perrig, Carnegie Mellon University
    Frank Seliger, IBM Pervasive Computing, Germany
    Mani Srivastava, UCLA
    Peng-Jun Wan, Illinois Institute of Technilogy
    Weili Wu, University of Texas at Dallas
    Jie Wu, Florida Atlantic University
    Guoliang Xue, Arizona State University
    Yuanyuan Yang, State University of New York, Stony Brook
    Yelena Yesha, University of Maryland, Baltimore County
    Yongguang Zhang, HRL Labs

    Contact Information:
    ---------------------
    Peter Reiher
    3564 Boelter Hall
    UCLA
    405 Hilgard Ave.
    Los Angeles, CA 90095
    (310) 825-8332
    reiher@cs.ucla.edu


       收藏   分享  
    顶(0)
      




    ----------------------------------------------

    -----------------------------------------------

    第十二章第一节《用ROR创建面向资源的服务》
    第十二章第二节《用Restlet创建面向资源的服务》
    第三章《REST式服务有什么不同》
    InfoQ SOA首席编辑胡键评《RESTful Web Services中文版》
    [InfoQ文章]解答有关REST的十点疑惑

    点击查看用户来源及管理<br>发贴IP:*.*.*.* 2005/12/6 9:31:00
     
     GoogleAdSense
      
      
      等级:大一新生
      文章:1
      积分:50
      门派:无门无派
      院校:未填写
      注册:2007-01-01
    给Google AdSense发送一个短消息 把Google AdSense加入好友 查看Google AdSense的个人资料 搜索Google AdSense在『 XML安全 』的所有贴子 点击这里发送电邮给Google AdSense  访问Google AdSense的主页 引用回复这个贴子 回复这个贴子 查看Google AdSense的博客广告
    2024/11/21 16:22:31

    本主题贴数1,分页: [1]

    管理选项修改tag | 锁定 | 解锁 | 提升 | 删除 | 移动 | 固顶 | 总固顶 | 奖励 | 惩罚 | 发布公告
    W3C Contributing Supporter! W 3 C h i n a ( since 2003 ) 旗 下 站 点
    苏ICP备05006046号《全国人大常委会关于维护互联网安全的决定》《计算机信息网络国际联网安全保护管理办法》
    3,390.625ms