ASDF - World Security Summit 2015

  • 30 Dec 2015
  • Bangalore, India

Description

Topics
  • (Inter)national applications of biometrics
  • General security architecture for CR networks
  • (Possible) role of pseudonymous and anonymous identity in identity management
  • (Inter)national policies on unique identifiers /social security numbers / personalisation IDs
  • Access control
  • (Privacy preserving) identity profiling and fraud detection
  • Anonymity and Privacy
  • Accountability
  • Applications of anonymous credentials
  • Application security
  • Attacks and defenses
  • Attack modeling, prevention, mitigation, and defense in CR systems, including primary user emulation attacks, authentication methods of primary users,spectrum sensing data falsification, spectrum misusage and selfish misbehaviors and unauthorized use of spectrum bands
  • Attribute based authentication and access control
  • Attacks on identity management infrastructures
  • Auditing in Cloud Computing
  • Auctions and Audits
  • Authentication and Identification
  • Authentication
  • Biometric verification
  • Automated development
  • Business and security risk models
  • Biometrics
  • Certification and Authorization
  • Censorship and censorship resistance
  • Cloud Infrastructure Security
  • Cloud Computing Security
  • Commercial Cryptographic Applications
  • Cloudcentric security modeling and threats
  • Copyright protection in the Cloud era
  • Contactless Payment and Ticketing Systems
  • Cryptography in the Cloud era
  • Crosslayer security design of CR networks
  • Data Outsourcing Security
  • Data Hiding and Recovery
  • Defending and mitigating jamming based DoS attacks in CR networks
  • Defending against energy depletion attacks in resource constrained CR networks
  • Digital Cash and Payment Systems
  • Design for Forensic Evaluation
  • Digital forensic processes and workflow models
  • Digital forensic case studies
  • Digital Incentive and Loyalty Systems
  • Digital Image Forensics
  • Distributed control systems/SCADA security
  • Digital Rights Management
  • Electronic IDs: European and worldwide policies and cooperation in the field of identity management
  • Distributed systems security
  • Embedded systems security
  • Embedded device forensics
  • Empirical secure software engineering
  • Emerging threats in Cloud-based services
  • Federative identity management and deperimeterisation
  • Event Reconstruction and Tracking
  • Forensics
  • File System Analysis
  • Forensics in Cloud environments
  • Forensics Education, Training, & Standards
  • Fraud Detection
  • Forensics in Untrusted Environments
  • Geo-location for security in CR networks
  • Game Theoretic Security
  • Hardware Assisted Forensics
  • Government PKIs
  • Identification and authentication procedures
  • Hardware security
  • Identity management solutions for eHealth, eGovernmeant and eCommerce
  • Identity management for mobile and ubiquitous computing
  • Identity theft prevention
  • Identity Theft
  • Impersonation, identity fraud, identity forge and identity theft
  • Impact on society and politics
  • Incident Response and Live Data Analysis
  • Implementation and testbed for security evaluation in CR systems
  • Infrastructure protection case studies
  • Information Security
  • Interoperable identity management solutions
  • Infrastructure sector interdependencies and security implications
  • Intrusion detection systems in CR networks
  • Intrusion detection
  • Legal and Regulatory Issues
  • Language based security
  • Legal, economic and policy issues related to critical infrastructure protection
  • Legal and regulatory issues in the Cloud era
  • Legal, Ethical and Privacy Issues
  • Legal, ethical and policy issues related to digital forensics
  • Malware
  • Legal, socioeconomic, philosophical and ethical aspects
  • Methods for detecting, isolating and expelling misbehaving cognitive nodes
  • Methods for Attributing Malicious Cyber Activity
  • Metrics
  • Methods of identification and authentication
  • Model checking for security
  • Microfinance and Micropayments
  • Multi-tenancy related security/privacy issues
  • Modeling and simulation of critical infrastructures
  • Network Evidence Collection
  • Network and cloud forensics
  • Network security
  • Network Forensics
  • Operating System and Application Analysis
  • Novel identity management technologies and approaches
  • Phishing and Social Engineering
  • Performance evaluation for security solutions
  • Privacy and Identity (Management) in and for cloud computing
  • Physical layer security for CR networks
  • Privacy enhancing Systems
  • Privacy and Identity in social networks
  • Privacy in Cloud computing
  • Privacy enhancing technologies
  • Privacy preserving systems
  • Privacy management of identity management
  • Processes for the development of secure software and systems
  • Privacy protection in CR networks
  • Programming paradigms, models and DLS`s for security
  • Program rewriting techniques
  • Protocol security
  • Proliferation/omnipresence of identification
  • Related developments in social tracking, tracing and sorting
  • Quality of identity data, processes and applications
  • Risk analysis and risk assessment methodologies
  • Reputation Systems
  • Risk Assessment and Management
  • Risk analysis techniques for privacy risk and privacy impact assessment
  • SCADA Forensics
  • Risk Perceptions and Judgments
  • Secure Banking and Financial Web Services
  • Scalable techniques for threat modeling and analysis of vulnerabilities
  • Secure information flow
  • Secure identity management mechanisms
  • Secure job deployment and scheduling
  • Secure information sharing
  • Secure virtualization and resource allocation mechanisms
  • Secure routing in multihop CR networks
  • Securing Emerging Computational Paradigms
  • Securing distributed data storage in the Cloud
  • Security and privacy in big data management
  • Security and Privacy in Automotive and Transport Systems and Applications
  • Security and Privacy in Mobile Devices and Applications
  • Security and privacy in mobile Cloud
  • Security and Privacy in Sound and Secure Financial Systems Based on Social Networks
  • Security and Privacy in Social Networks
  • Security and privacy requirements engineering in the Cloud
  • Security and privacy policies
  • Security architectures
  • Security architecture and design for software and systems
  • Security challenges, solutions and implementation issues
  • Security assurance cases
  • Security for emerging Cloud programming models
  • Security Economics
  • Security issues for database based CR networks
  • Security in CR networks for the smart grid
  • Security measurement
  • Security management in the Cloud
  • Security oriented software reconfiguration and evolution
  • Security modelling and threats in Cloud computing
  • Security testing
  • Security policies, standards and regulations for CR networks
  • Spam
  • Smartcards, Secure Tokens and Secure Hardware
  • Specification formalisms for security artifacts
  • Specification and management of security requirements and policies
  • Surveillance and monitoring
  • Support for assurance, certification and accreditation
  • Systematic support for security best practices
  • System security
  • Theories, techniques and tools for extracting, analyzing and preserving digital evidence
  • Telecommunications network security
  • Tracing, monitoring and forensics
  • Threats to democracy and political control
  • Transactions and Contracts
  • Tradeoff between security and other nonfunctional requirements (in particular economic considerations)
  • Trust Management
  • Trust and policy management in the Cloud
  • Usability and security
  • Underground Market Economics
  • User authentication and access control in Cloudaware services
  • Usable Security
  • User-centric identity management
  • User centered, usable and inclusive identity management
  • Virtual Economies
  • Verification techniques for security properties
  • Voting Systems
  • Visualization for Forensics
  • Web security
  • Vulnerabilities in electronic identification protocols
  • Infrastructure vulnerabilities, threats and risks
Who should Attend
  • Engineers
  • Researchers
  • Professors
  • Students

Past Events

Important

Please, check "ASDF - World Security Summit" official website for possible changes, before making any traveling arrangements

Event Categories

Business: Security & Safety
Science: Computer Science
Technology: Information Technology (IT), IT Security

Other Events with Similar Categories

Other Events with Similar Location or Organizer

Featured Conferences & Exhibitions