[Dtls-iot] [CFP] 2nd International Workshop on IoT Privacy, Trust, and Security (IoTPTS 2016)

IoTPTS Chairs <iotpts2016chairs@gmail.com> Mon, 07 December 2015 05:50 UTC

Return-Path: <iotpts2016chairs@gmail.com>
X-Original-To: dtls-iot@ietfa.amsl.com
Delivered-To: dtls-iot@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3CEA1B2F04 for <dtls-iot@ietfa.amsl.com>; Sun, 6 Dec 2015 21:50:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_22=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iuYtRWFl1hvK for <dtls-iot@ietfa.amsl.com>; Sun, 6 Dec 2015 21:50:12 -0800 (PST)
Received: from mail-io0-x232.google.com (mail-io0-x232.google.com [IPv6:2607:f8b0:4001:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6194C1B2F03 for <dtls-iot@ietf.org>; Sun, 6 Dec 2015 21:50:12 -0800 (PST)
Received: by iouu10 with SMTP id u10so174495382iou.0 for <dtls-iot@ietf.org>; Sun, 06 Dec 2015 21:50:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=UZ3NpGqiUJmOwDOHZBbxh+WDoeIt3Gdfy8NAEtCHCio=; b=DRM6vM1rY0kUQhKUXNVx12A6+J7eb/Gj2i9N+QVOBFslkqJsy5GNpcb9/NI5mNd6r5 Oje2pnPbwjqh37jHgApcSkLGIeGjmNbE/YxD57oXP8p8uztJ0AggHElQ+GnGaMGV7gqZ PCCpRD5O6hyYoD/8+ggBSxdlT07N94i+YF9eUeS5cZZLuVR4P1XoxeLYUd0eQQ3v2clZ u2GSYf1C1HL/JgLZ2Zb/8w8J5xO3wwrau5NM7zaZThR8RHP/qmYXjdf1YalzhpAASdzz 19o6mdooDTKR0F+eLmYokgA89yB13LrN2uhH+fg2WFLl6gtS5uezF7TmxGbHelW9m60t MNvQ==
MIME-Version: 1.0
X-Received: by 10.107.165.21 with SMTP id o21mr24465187ioe.155.1449467411749; Sun, 06 Dec 2015 21:50:11 -0800 (PST)
Received: by 10.107.137.155 with HTTP; Sun, 6 Dec 2015 21:50:11 -0800 (PST)
Date: Sun, 6 Dec 2015 21:50:11 -0800
Message-ID: <CAM5kaE7sh53ShzCUOQkSj2XCSs7cgUWCQsF7FRHPKiNABHV3rg@mail.gmail.com>
From: IoTPTS Chairs <iotpts2016chairs@gmail.com>
To: dtls-iot@ietf.org
Content-Type: multipart/alternative; boundary=001a1141cfea30e1960526486e40
Archived-At: <http://mailarchive.ietf.org/arch/msg/dtls-iot/EdrCvzAtSGcbQFxKpIefTlh1fm0>
Subject: [Dtls-iot] [CFP] 2nd International Workshop on IoT Privacy, Trust, and Security (IoTPTS 2016)
X-BeenThere: dtls-iot@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DTLS for IoT discussion list <dtls-iot.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtls-iot>, <mailto:dtls-iot-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtls-iot/>
List-Post: <mailto:dtls-iot@ietf.org>
List-Help: <mailto:dtls-iot-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtls-iot>, <mailto:dtls-iot-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Dec 2015 05:50:13 -0000

Held in conjunction with ASIACCS 2016 in Xi'an, China from May 30 - June 3,
2016.

Paper submission: Feb 12, 2016
Author notification: March 1, 2016


The Internet of Things (IoT) is the next great technology frontier. At
a basic level, IoT refers simply to networked devices, but the IoT
vision is a complex ecosystem that ranges from cloud backend services
and big-data analytics to home, public, industrial, and wearable
sensor devices and appliances. Architectures for these systems are in
the formative stages, and now is the time to ensure privacy, trust,
and security are designed into these systems from the beginning.

We encourage submissions on all aspects of IoT privacy, trust, and security.

Topic of interest include (but are not limited) to the following areas:
- Privacy and IoT data
- Privacy attacks for IoT
- Trust management and device discoverability for IoT
- Usability of privacy and security systems in IoT
- User risk perceptions and modeling for IoT
- Policy Management and enforcement for IoT
- Authentication and access control for users for IoT
- Cryptography for IoT
- Attack detection and remediation for IoT
- Security architectures for IoT systems and applications

===========================
For more information, see https://sites.google.com/site/iotpts2016/

Best,
IoTPTS Chairs (Richard Chow and Gokay Saldamli)
iotpts2016chairs@gmail.com