This edition of Intricate-Sec is centered on Resource Constrained Computing. Computing under resource constraints is a relatively new field in computer science, in which we seek to develop solutions that are viable in terms of performance. Application examples emerge in rural/remote developing world regions where access to computational resources and in-house human capital (in terms of specialised expertise) is impeded for economic reasons. In such cases, it makes sense to seek cost-effective alternatives to deploying Internet services.
Typical solution models rely on mobile phones, and lossy communication networks as a cost effective approach to service delivery. Using a trusted centralised framework for service delivery is not always feasible in these cases, and so distributed management offers a viable alternative. Distributed management however, raises concerns centered around subversion whereby in contrast to standard adversarial models, the malicious party seeks to mask attacks as faults with the goal of gaining some advantage without necessarily provoking a breakdown of the communication network. While seemingly harmless on initial level, when conducted over an extended period and by multiple parties, such attacks can result in unreliable and untrustworthy performance.
Topics include, but are not limited to the following:
Authentication and Authorization for RCC Systems
Anonymity on RCC Systems
Applications of Cryptography to RCC Systems
Combating Fake News, Phishing, Spoofing, and Spam in RCC Systems
Distributed Denial of Service in RCC Networks
Fault Tolerance on RCC Networks
Identity Management Models on RCC Networks
Intrusion Detection and Response on RCC Networks
Studies/Experiences on Social Media and Micro-targeting on RCC Networks
Studies/Experiences on Social Media and Fake News on RCC Networks
Privacy Enhancing Methodologies for RCC Systems
Privacy Preserving Data Publishing on RCC Networks
Privacy Preserving Data Analytics on RCC Systems
Pseudonymity on RCC Systems
Tracking and Profiling on RCC Networks
Trust Management Models for RCC Systems
05月16日
2018
05月18日
2018
摘要截稿日期
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言