The continuously evolving nature of today’s internet outdates the existing security and safety mechanisms and therefore there is an emerging need to propose robust, powerful and reliable solutions. These advancements have a great impact on the software and system architectures, resulting in a highly dynamic smart networked environment. The systems used within these complex environments have at least two things in common, namely, the need to restrict or grant access for the required resources based on security policy to face security threats, and the need to sustain resilience of the environment in face of safety hazards. Both aspects should consider trust.
Security, safety and trustworthiness on these channels and systems play an important role in this regard. By providing a unified approach that is able to specify and interpret the security policies, relationships and credentials and is able to allow direct authentication for security critical activities. By building trust among different entities involved in the system, the security of the sensitive resources could be ensured more effectively. Similarly, the establishment of different levels of trust within the systems involved in the network can actually improve the security and cooperation among the network entities and can also help in reducing the malicious activities and the safety hazards.
However, as these environments combine systems and applications of different nature, they have different notions for what a resource could possibly be or do, and have different security policies, information assurance needs and safety rules. For example, the network bandwidth could be a resource for a web browser, individual records a resource for a database server, money and accounts resources for a banking application, etc. There is a need to develop a generic security and safety management mechanism that is reliable enough to handle multiple types and numbers of resources for different nature of applications and systems, which the existing mechanisms are unable to handle. These should possibly be developed under a co-engineering approach which considers both security threats and safety hazards.
The goal of SSTM’20 is to attract young researchers, Ph.D. students, practitioners, and industry experts to bring contributions in the area of Security, Safety and Trust Management, especially in the developments of computing, management and programming models, technologies, framework and middleware.
You are invited to submit research papers in the following areas:
|Submission Deadline :||
|Author Notification :||March 21st, 2020|
|Camera-ready Deadline :||April 04th, 2020|
|Conference:||June 10-12, 2020|
All submissions must be carefully anonymized for double-blind reviewing. Papers up to six (6) double-column pages (including figures, tables and references) should contain original contributions not published or submitted elsewhere and are to be formatted according to the IEEE template, which is available here.
Accepted papers will be included in the proceedings published by the IEEE Computer Society Press and will be archived in the IEEE Xplore Digital Library
The TRUST submission system (EasyChair) is available here: Easy Chair