2009-04-30

[Mycolleagues] Second International Workshop on War and Peace Driving


             

                          Call for Papers
 
      Second International Workshop on War and Peace Driving
                           (WPDWiMob’09)

      http://www.glyndwr.ac.uk/computing/research/wimob2009/
 

                        In conjunction with
                            WiMob 2009
                         Marrakech, Morocco
                      October 12th-14th, 2009

             http://conferences.computer.org/wimob2009/

Scope
-----
The scope of the workshop covers issues relating to both security technologies and the
socio-economical impact of the widespread uptake of wireless networking by those in business,
industry and the general public.

The term war driving is widely recognised as describing the activities undertaken by those
who may intend to illegally access a computer network. As one method of addressing security
concerns and raising awareness of these issues, we propose the term peace driving to begin
to describe exploration and research activities within the wireless domain.

Wireless networking is incredibly widespread and is now commonplace in industry, academia,
business, and the home. The very nature of wireless radio signals means that physical
security measures have all but become redundant in protecting computer systems and networks
from unauthorised access. This means that software-based security is now of paramount
importance. Access control, encryption and authentication are key to ensuring that intruders
remain outside the private network.

In particular, the lack of physical constraints means that security issues are becoming more
and more relevant to the casual Internet user at home, the majority of who are non-specialists.
Casual users employing wireless networking technology may not be aware of the activities taking
place without their knowledge. The uptake of wireless networking therefore impacts upon society
in general and has numerous legal, ethical and sociological issues, as well as technological.

This workshop aims to address issues relating to unwanted wireless network access, war driving,
security mechanisms, encryption, and authentication techniques. We equally value topics relating
to security awareness for the non-specialist, legal and ethical issues, and sociological matters
relating to wireless networking.

Topics of Interest
------------------
Topics of interest include but are not limited to:
- Authentication
- Auditing tools
- Case studies
- Emerging threats & trends
- Encryption
- Ethical, social and legal issues
- Filtering
- Geographical network studies
- Intruder detection & prevention
- Network management
- Protocols & standards
- Penetration testing
- Security policies
- Security tools
- Threat analysis
- Threat tools
- User impact
- Wireless uptake
 
Important Dates
---------------
Paper submission due:          June 7, 2009
Paper acceptance notification: July 26, 2009
Final manuscript due:          August 10, 2009
Registration:                  August 20, 2009
Workshop:                      October 12, 2009

Paper Submission
----------------
Submitted papers must represent original material that is not currently under review in
any other conference or journal, and has not been previously published. Paper length
should not exceed five-page technical paper manuscript. Please see author information
page for submission guidelines at WiMob 2009 website
(http://conferences.computer.org/wimob2009/WorkshopsSymposia.html). Papers should be
submitted in a PDF format through EDAS.
Submissions should include a cover page with authors' names, affiliations, fax and
telephone numbers and e-mail addresses. All accepted papers will be published in the
conference proceedings. At least one author of accepted papers is required to register
at the full registration rate.

Contact
-------
Stuart Cunningham (s(dot)cunningham(at)glyndwr.ac.uk)

No comments: