The development of basic technologies such as network technology, computer technology and sensor technology has promoted the development of ubiquitous computing. The purpose of ubiquitous computing is to create an environment full of computing and communication capabilities, and to integrate this environment with people gradually. In this integration space, people can access digital services transparently at anytime and anywhere.
Ubiquitous computing environment is a mobile and distributed information system, which involves many kinds of networks and information technologies. While designing cryptographic primitives, access control models, security protocols and security systems, the characteristics of ubiquitous computing such as openness, cross-domain, mobility, environment awareness and limited resources should be taken into account.
This is the first SUC conference, and the purpose of this conference is to gather researchers and practitioners from academia and industry, to focus on discussing and identifying potential security risks and problems in Ubiquitous Computing, to classify them, and to summarize and exchange existing solutions. The expected outcomes are as follows:
Summarizing the trust management mechanism and access control scheme in ubiquitous computing.
Exploring privacy protection scheme in ubiquitous computing environment.
Envisaging the future research directions to solve the security problems of ubiquitous computing.
Topics of the Workshop
This workshop aims to be a forum for sharing security issues and solutions in ubiquitous computing. The main topics of the workshop are as follows (but not limited to):
Network Trust Management Based on User Identity
Data Transmission Security
Inter-device Access Control Based on Constrained Physical Range
Access Control in Distributed Computing Environment
Terminal Security in Ubiquitous Computing Environment
Privacy Protection Scheme for Ubiquitous Computing
System Security Scheme for Ubiquitous Computing
Data Storage Security in Ubiquitous Computing Networks
Security in Wireless Network and Mobile Systems
Security of IoT Systems
Security of Operation Systems
Feb 19th, 2019 (PST): Submission Deadline
April 26th, 2019 (PST): Submission Deadline New
April 30th, 2019 (PST): Acceptance Notification
May 5th, 2019 (PST): Acceptance Notification New
May 19th, 2019 (PST): Camera-ready Due
August 19th, 2019: Workshop Day
1. Ji Xiang, Professor, Institute of Information Engineering, Chinese Academy of Sciences, China
Ji Xiang is a professor in Institute of Information Engineering, Chinese Academy of Sciences. He obtained his Ph.D. from Graduate University of Chinese Academy of Sciences in 2009. His research interests include Security and Privacy, Networking, and Big Data, and has published more than 40 papers in recent years, including top conference such as AAAI, ESORICS, ACSAC, AsiaCCS and so on.
Contact:Ji Xiang, email@example.com
2. Daren Zha, Senior Engineer, Institute of Information Engineering, Chinese Academy of Sciences, China
Daren Zha received his Ph.D. degree in Information Security from Graduate University of Chinese Academy of Sciences. Now he is a Senior Engineer in Institute of Information Engineering, Chinese Academy of Sciences. His research interests include Applied Cryptography, Data Security and Privacy, Network and System Security, and intelligent analysis of big data, and has published more than 20 papers in recent years, including Chinese Journal of Electronics, ISPEC, TrustCom and so on.
3. Zheng Zhang, Professor, JinLing Institute of Technology, China
Zheng Zhang is now a full professor at JinLing Institute of Technology, Dean of School of Software Engineering and School of Cyber Security. His research concerns computer network security and wireless communication security. He presided over and participated in a number of major ministerial-level scientific research projects in China. In 2004 and 2010, he won the second prize of China's National Science and Technology Progress Award(2nd and 1st respectively), 5 times won the China Ministerial Science and Technology Progress Award. He was selected as Young and Middle Aged Leader in Jiang Su Province and Young and Middle Aged Expert with outstanding contributions in Nanjing.
4. Le Guan, Assistant Professor, University of Georgia, USA
Le Guan is an assistant professor in the department of computer science at the University of Georgia (UGA). Prior to joining UGA, he was a post-doc at Penn State supervised by Prof. Peng Liu. He received a PhD from the Institute of Information Engineering, Chinese Academy of Sciences in 2015, and a BS degree from the University of Science and Technology of China in 2009. His research interests cover many topics in the field of systems security, including operating systems, mobile systems, and IoT systems. He specialized in leveraging COTS hardware components/features to design and build systems that are more reliable and secure than solutions based on software alone. He is also interesting in security problems with the low-cost micro-controller systems. He has published papers in IEEE S&P, NDSS, MobiSys, SenSys, ACSAC, RAID, and TDSC.
Invited PC Members
Neng Gao, Institute of Information Engineering, Chinese Academy of Sciences, China
Lei Wang, Institute of Information Engineering, Chinese Academy of Sciences, China
Min Zuo, Beijing Technology and Business University, China
Shui Yu, University of Technology Sydney, Australia
Zheng Yao, University of Chinese Academy of Sciences, China
Chen Cao, Pennsylvania State University, USA
Ying Zhao, Beijing University of Chemical Technology, China
Kaiping Xue, University of Science and Technology of China, China
Zhenhua Ling, University of Science and Technology of China, China
Submissions must not exceed 6 pages (including references). Authors should avoid the use of non-English fonts to avoid problems with printing and viewing the submissions. All manuscripts should be formatted in the IEEE Computer Society Proceedings Format , and submitted in the Portable Document Format (.pdf).
All papers should be submitted via the conferences’ EDAS system. Authors should register with the EDAS system first, and then make the submission via the conference link https://edas.info/N25463 from which you can navigate to your workshop. Make sure you select the right workshop for your paper.
All accepted papers will be published by IEEE CPS (IEEE-DL and EI indexed). At least one author of each accepted paper is required to register and present their work at the conference; otherwise the paper will not be included in the proceedings. Selected papers will be recommended to journal special issues such as IJGHPC https://www.igi-global.com/journal/international-journal-grid-high-performance/1105. More details can be found via http://www.smart-world.org/2019/ .