(Privacy preserving) identity profiling and fraud detection
Anonymity and Privacy
Accountability
Applications of anonymous credentials
Application security
Attacks and defenses
Attack modeling, prevention, mitigation, and defense in CR systems, including primary user emulation attacks, authentication methods of primary users,spectrum sensing data falsification, spectrum misusage and selfish misbehaviors and unauthorized use of spectrum bands
Attribute based authentication and access control
Attacks on identity management infrastructures
Auditing in Cloud Computing
Auctions and Audits
Authentication and Identification
Authentication
Biometric verification
Automated development
Business and security risk models
Biometrics
Certification and Authorization
Censorship and censorship resistance
Cloud Infrastructure Security
Cloud Computing Security
Commercial Cryptographic Applications
Cloudcentric security modeling and threats
Copyright protection in the Cloud era
Contactless Payment and Ticketing Systems
Cryptography in the Cloud era
Crosslayer security design of CR networks
Data Outsourcing Security
Data Hiding and Recovery
Defending and mitigating jamming based DoS attacks in CR networks
Defending against energy depletion attacks in resource constrained CR networks
Digital Cash and Payment Systems
Design for Forensic Evaluation
Digital forensic processes and workflow models
Digital forensic case studies
Digital Incentive and Loyalty Systems
Digital Image Forensics
Distributed control systems/SCADA security
Digital Rights Management
Electronic IDs: European and worldwide policies and cooperation in the field of identity management
Distributed systems security
Embedded systems security
Embedded device forensics
Empirical secure software engineering
Emerging threats in Cloud-based services
Federative identity management and deperimeterisation
Event Reconstruction and Tracking
Forensics
File System Analysis
Forensics in Cloud environments
Forensics Education, Training, & Standards
Fraud Detection
Forensics in Untrusted Environments
Geo-location for security in CR networks
Game Theoretic Security
Hardware Assisted Forensics
Government PKIs
Identification and authentication procedures
Hardware security
Identity management solutions for eHealth, eGovernmeant and eCommerce
Identity management for mobile and ubiquitous computing
Identity theft prevention
Identity Theft
Impersonation, identity fraud, identity forge and identity theft
Impact on society and politics
Incident Response and Live Data Analysis
Implementation and testbed for security evaluation in CR systems
Infrastructure protection case studies
Information Security
Interoperable identity management solutions
Infrastructure sector interdependencies and security implications
Intrusion detection systems in CR networks
Intrusion detection
Legal and Regulatory Issues
Language based security
Legal, economic and policy issues related to critical infrastructure protection
Legal and regulatory issues in the Cloud era
Legal, Ethical and Privacy Issues
Legal, ethical and policy issues related to digital forensics
Malware
Legal, socioeconomic, philosophical and ethical aspects
Methods for detecting, isolating and expelling misbehaving cognitive nodes
Methods for Attributing Malicious Cyber Activity
Metrics
Methods of identification and authentication
Model checking for security
Microfinance and Micropayments
Multi-tenancy related security/privacy issues
Modeling and simulation of critical infrastructures
Network Evidence Collection
Network and cloud forensics
Network security
Network Forensics
Operating System and Application Analysis
Novel identity management technologies and approaches
Phishing and Social Engineering
Performance evaluation for security solutions
Privacy and Identity (Management) in and for cloud computing
Physical layer security for CR networks
Privacy enhancing Systems
Privacy and Identity in social networks
Privacy in Cloud computing
Privacy enhancing technologies
Privacy preserving systems
Privacy management of identity management
Processes for the development of secure software and systems
Privacy protection in CR networks
Programming paradigms, models and DLS`s for security
Program rewriting techniques
Protocol security
Proliferation/omnipresence of identification
Related developments in social tracking, tracing and sorting
Quality of identity data, processes and applications
Risk analysis and risk assessment methodologies
Reputation Systems
Risk Assessment and Management
Risk analysis techniques for privacy risk and privacy impact assessment
SCADA Forensics
Risk Perceptions and Judgments
Secure Banking and Financial Web Services
Scalable techniques for threat modeling and analysis of vulnerabilities
Secure information flow
Secure identity management mechanisms
Secure job deployment and scheduling
Secure information sharing
Secure virtualization and resource allocation mechanisms
Secure routing in multihop CR networks
Securing Emerging Computational Paradigms
Securing distributed data storage in the Cloud
Security and privacy in big data management
Security and Privacy in Automotive and Transport Systems and Applications
Security and Privacy in Mobile Devices and Applications
Security and privacy in mobile Cloud
Security and Privacy in Sound and Secure Financial Systems Based on Social Networks
Security and Privacy in Social Networks
Security and privacy requirements engineering in the Cloud
Security and privacy policies
Security architectures
Security architecture and design for software and systems
Security challenges, solutions and implementation issues
Security assurance cases
Security for emerging Cloud programming models
Security Economics
Security issues for database based CR networks
Security in CR networks for the smart grid
Security measurement
Security management in the Cloud
Security oriented software reconfiguration and evolution
Security modelling and threats in Cloud computing
Security testing
Security policies, standards and regulations for CR networks
Spam
Smartcards, Secure Tokens and Secure Hardware
Specification formalisms for security artifacts
Specification and management of security requirements and policies
Surveillance and monitoring
Support for assurance, certification and accreditation
Systematic support for security best practices
System security
Theories, techniques and tools for extracting, analyzing and preserving digital evidence
Telecommunications network security
Tracing, monitoring and forensics
Threats to democracy and political control
Transactions and Contracts
Tradeoff between security and other nonfunctional requirements (in particular economic considerations)
Trust Management
Trust and policy management in the Cloud
Usability and security
Underground Market Economics
User authentication and access control in Cloudaware services
Usable Security
User-centric identity management
User centered, usable and inclusive identity management
Virtual Economies
Verification techniques for security properties
Voting Systems
Visualization for Forensics
Web security
Vulnerabilities in electronic identification protocols
Infrastructure vulnerabilities, threats and risks
Who should Attend
Engineers
Researchers
Professors
Students
Past Events
ASDF - World Security Summit 2015 - 30 Dec 2015, Bangalore, India (52603)
Important
Please, check "ASDF - World Security Summit" official website for possible changes, before making any traveling arrangements
Event Categories
Business: Security & Safety
Science: Computer Science
Technology: Information Technology (IT), IT Security