Technical Tracks

Track 7: Security, Privacy, and Trust
Track Co-Chairs:
Michele Nogueira Lima, Federal University of Minas Gerais, Brazil, michele@dcc.ufmg.br
Wei Yu, Towson University, USA, wyu@towson.edu

Description:
The universal network connectivity and the rapid growth of Internet applications (such as broadband mobile networks, Cloud/Edge computing, and Internet of Things that support numerous smart-world systems) have made our society more and more depending on connected networks and applications. However, how to enforce security, privacy and trust in these systems has become one of the most critical issues we are facing. Although we already have many solutions, new methods and new algorithms are needed for enforcing security and trust, preserving user and system privacy, and encouraging better and stronger practices with strong incentives. The Security, Privacy and Trust track welcomes submissions of original research papers from academic and practitioners which show novel contributions on algorithms, system designs, implementations, and evaluations. We welcome papers in the following areas and other related areas.

Track Topics:
• Anonymous Communication and Applications
• Blockchain and Decentralized Trust Management
• Confidential Computing and Next Frontiers in Security
• Cloud/Edge Security and Privacy
• Computer Network Security and Privacy
• Computer and Network Forensics
• Cyber Threat Intelligence
• Cyber-physical System Security
• Data Security and Multiparty Access Control
• Intelligent Forensics Tools, Techniques and Procedures
• Optimization of Utility-Privacy Tradeoffs
• Security Driven Configuration Management
• Security, Privacy, and Trust for Artificial Intelligence
• Security, Privacy, and Trust for Big Data
• Security, Privacy, and Trust for Cyber-Physical Systems
• Security, Privacy, and Trust for Networked Control Systems
• Security, Privacy, and Trust for Resource-Constrained Devices
• Security, Privacy, and Trust for Software Defined Networking
• Security, Privacy, and Trust for Wireless Networks
• Smart Cards and Secure Hardware
• Penetration Testing and Network Security
• Private Information Retrieval
• Privacy-Preserving Data Aggregation
• Privacy-Preserving Trust Management
• Trust and Reputation Models
• Usable Security and Privacy
• Vulnerability, Exploitation Tools, and Virus/Worm Analysis

TPC list:
• Xuhui Chen, Kent State University
• Long Cheng, Clemson University
• Baek-Young Choi, University of Missouri-Kansas City
• Guido Dartmann, Trier University of Applied Sciences
• Parisa Eslami, University of Maryland Baltimore County
• Xinwen Fu, University of Massachusetts Lowell
• Linqiang Ge, Columbus State University
• Yong Guan, Iowa State University
• Yifan Guo, Towson University
• Kun Hua, California Polytechnic State University
• Woosub June, Towson University
• Kai Li, San Diego State University
• Weixian Liao, Towson University
• Xing Liu, Sam Houston State University
• Akshita Maradapu Vera Venkata Sai, Towson University
• Shantanu Pal, Deakin University
• Cheng Qian, Hood College
• Mohamed Rahouti, Fordham University
• Anke Schmeink, "RWTH University, INDA"
• Pu Tian, Stockton University
• Emmanouil Vasilomanolakis, Technical University of Denmark
• Qianlong Wang, Towson University
• An Wang, Case Western Reserve University
• Sheng Wen, Swinbourne University of Technology
• Xin-Wen Wu, University of Mary Washington
• Yang Xiao, The University of Alabama
• Guobin Xu, Frostburg State University
• Hanlin Zhang, Towson University
• Yuchen Zhao, University of York
• Jingyi Zheng, Auburn University