<P class=MsoNormal style=″MARGIN–LEFT: 0.5in″><SPAN style=″mso–bookmark: Scope″>The proliferation of Internet services and applications is bringing systems and network security issues to the fore. The past few years have seen significant increase in cyber attacks on the Internet, resulting in degraded confidence and trusts in the use of Internet and computer systems. There is an increasing demand for measures to guarantee the privacy, integrity, and availability of resources in distributed systems, such as Grid and P2P systems. The attacks, including <SPAN class=SpellE>DDoS</SPAN>, email virus, and worms, are getting more sophisticated, spreading faster, and causing more damages. The attacks originally exploited the weakness of the individual protocols and operating systems, but now also have started to attack the basic infrastructure of the Internet. There is a consensus that a key contributing factor leading to cyber threats is the lack of integrated and cohesive strategies that extend beyond the network level, to protect the applications and devices at system level as well. Many techniques, algorithms, protocols and tools have been developed in the different aspects of <SPAN class=SpellE>cybersecurity</SPAN>, namely, authentication, access control, availability, integrity, privacy, confidentiality and non–repudiation as they apply to both networks and systems.</SPAN></P> <P class=MsoNormal style=″MARGIN–LEFT: 0.5in″><SPAN style=″mso–bookmark: Scope″></SPAN><B>Keywords:</B> <BR></P> <UL type=circle> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Ad hoc and sensor network security </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Cryptographic algorithms and distributed digital signatures </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Distributed denial of service attacks </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Distributed intrusion detection and protection systems </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Firewall and distributed access control </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Grid computing security </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Key management </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Network security issues and protocols </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″></SPAN><?XML:NAMESPACE PREFIX = ST1 /><ST1:CITY><ST1:PLACE><SPAN style=″mso–bookmark: Interest″>Mobile</SPAN></ST1:PLACE></ST1:CITY><SPAN style=″mso–bookmark: Interest″> codes security and Internet Worms </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Security in e–commerce </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Security in peer–to–peer and overlay networks </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Security in mobile and pervasive computing </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Security architectures in distributed and parallel systems </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Security theory and tools in distributed and parallel systems </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Video surveillance and monitoring systems </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Information hiding and multimedia watermarking in distributed systems </SPAN> <LI class=MsoNormal style=″mso–margin–top–alt: auto; mso–margin–bottom–alt: auto; mso–list: l0 level2 lfo3; tab–stops: list 1.0in″><SPAN style=″mso–bookmark: Interest″>Web content secrecy and integrity</SPAN> </LI></UL>
Abbrevation
SSN
City
Miami, FL
Country
United States
Deadline Paper
Start Date
End Date
Abstract