Scope
Security is an important issue in network and distributed systems research, ranging from traditional computer networks to newly proliferated areas like sensor networks, P2P systems, and ubiquitous computing. Security threats exploit the weaknesses of protocols as well as operating systems, and also extend to attacks on Internet applications such as database systems and web servers. The attacks involve, for example, distributed denials of services, viruses, buffer overflows, and worms, and cause increasingly greater economic damage, attracting more and more attention. To achieve a secure distributed system, cybersecurity aspects such as data confidentiality, authentication, nonrepudiation, data integrity, privacy, access control, and availability should be fully attained.
This symposium provides a forum for academic, government, and industry professionals to discuss recent progress in the area of network and distributed systems security. It includes studies on security attacks that occur in today's networks, security mechanisms that are designed to detect, prevent, or recover from a security attack and security services that are available to enhance system security.
Topics
Topics of interest include, but are not limited to :
- Distributed digital signatures
- Distributed denial of service attacks
- Distributed intrusion detection and protection systems
- Distributed access control and firewalls
- Security in e-commerce and e-business and other applications
- Security in P2P networks and grid computing
- Security in mobile and pervasive computing
- Security architectures in distributed and parallel systems
- Security theory and tools in distributed and parallel systems
- Wireless ad hoc and sensor network security
- Cryptographic algorithms
- Data privacy and trust
- Information hiding and watermarking in distributed systems
- Key management and authentication
- Mobile codes security
- Network security issues and protocols
- Software security
- Software engineering for security and privacy
- World Wide Web security
Special Issue of Journal
Authors of the 20 best papers will be invited to expand their papers for
submission to a special issue of the Journal of Computer Security,
a leading security journal.
|