Track 2

Track 2: Security, Privacy, and Trust

Track Chair:

  • Gianpiero Costantino, Italian National Research Council (CNR), Pisa, Italy
  • Ilaria Matteucci, IIT-CNR, Italy
  • Jorge Bernal Bernabe, University of Murcia, Spain

 

Scope:

The Security, Privacy and Trust track aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products that involve the cybersecurity aspects in our daily activities. The focus of the track is on advances in

cybersecurity technologies that involves new attacks and hacker exploits in several domains such as automotive, cyber-physical systems, networking infrastructure, quantum computing, artificial intelligence, deep learning for information security, digital crime and forensics, intrusion detection/prevention and incident response, malware and attack analysis, privacy and data breaches, and governance and information security management. The track aims at presenting the advancement on the state of art in these fields and spreading their adoption in several scenarios involving main stockholders of the Security, Privacy and Trust domain. We solicit submissions of original unpublished scholarly work that is not under consideration by another journal or conference.

Topics of interest include:

  • Security threats and vulnerabilities
  • Privacy and Security in Cloud and Edge Computing
  • Privacy and Security in Data Center Networks
  • Automated Vehicular Technologies
  • Vehicular Communications and Networks
  • In-Vehicle communication protocols
  • Offensive and Defensive Cybersecurity
  • Identity Management and Key Management Systems
  • Security and Privacy in Quantum Computing
  • Exploit design and implementation
  • Network privacy and security
  • Application security
  • Cyber-security solutions for connected and autonomous vehicles
  • Attacks and Countermeasures
  • Authentication
  • Safety and Security Trade-off and Convergences
  • Distributed systems security
  • Embedded systems security
  • Forensics
  • Intrusion detection and Response
  • Malware and virus detection
  • Mobile security and privacy
  • Network security
  • Privacy-preserving systems
  • IoT privacy and security
  • Security and privacy policies
  • Security architectures
  • System security
  • Usable security and privacy
  • Web security and privacy
  • Privacy of vehicular data
  • Standardization and Interoperability
  • National information Security
  • Mobile trusted computing
  • Security policy and management of trusted computing
  • Access control for trusted platforms
  • Privacy aspects of trusted computing
  • Verification of trusted computing architectures
  • End-user interactions with trusted platforms
  • Limitations of trusted computing

This topic list is not meant to be exhaustive. Security and privacy is interested in all aspects of computer security and privacy.

Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Program Committee:

  • Stelvio  Cimato, Università degli studi di Milano, Italy
  • Miran Taha, University of Sulaimani, Iraq
  • Chinmaya Dehury, University of Tartu, Estonia
  • Marc Lacoste,  Orange Labs, France
  • Raol Pardo Jimenez, University of Copenhagen, Denmark
  • Nesrine Kaaniche, Telecom SudParis, France
  • Hassan Badir, ENSA of Tangier, Morocco
  • Stefano Sebastio, Collins Aerospace, Ireland
  • Hassina Meziane, université Oran 1 ahmed benbella, Algeria
  • Francesco Santini, Dipartimento di Matematica e Informatica, Università di Perugia, Italy
  • John Mace, Newcastle University, United Kingdom
  • Silas Albuquerque, UnB, Brasil
  • Abderrahim Maizate, CED Engineering Sciences Ecole Superieure de Technologie Hassan II University of Casablanca, Morocco
  • Youakim Badr, The Pennsylvania State University, United States
  • Battou  Amal, uiz, Morocco
  • Christophe  Feltus, Luxembourg Institute of Science and Technology, Luxembourg
  • Paulo Gondim, Universidade de Brasília, Brasil
  • Cristiano Miosso, Universidade de Brasília, Brasil
  • Priscila Solis, Universidade de Brasília, Brasil
  • Nadia Bennani, INSA de Lyon, LIRIS, France       
  • Charif   Mahmoudi, NIST - International Associate
  • Romain Laborde, University Paul Sabatier Toulouse III, France
  • M. Tolga Sakalli, Trakya University, Turkey
  • Davide Micale, Università degli Studi di Catania, Italy
  • Faiza Loukil, University of Lyon, France
  • Ibéria Medeiros, LaSIGE, Faculdade de Ciências da Universidade de Lisboa, Portugal
  • Erdinc Ozturk, Sabanci University, Turkey
  • Elif Bilge Kavun, The University of Sheffield, United Kingdom
  • Shujun  Li, University of Kent, United Kingdom
  • Naercio Magaia, LASIGE, Departamento de Informática, Universidade de Lisboa, Portugal
  • Aydin Aysu, North Carolina State University, United States
  • Tolga Yalcin, Northern Arizona University, United States
  • Salima  Benbernou, Université Paris Descartes, France
  • Manuel Munier, UPPA, France
  • Omar Hasan, University of Lyon, France
  • Marco De Vincenzi, IIT-CNR, Italy
  • Bogdan Groza, Universitatea Politehnica Timisoara, Romania
  • Mathias  Johanson, Alkit, Sweden
  • Erich Leitgeb, University of Graz, Austria
  • Francesco Mercaldo, University of Molise, Italy