Navigation

apoios-header

 

Universidade da Beira Interior

 

INESC Tecnologia e Ciência - INESC TEC

 

Outsystems

 

Dimension Data

 

MaxData-Healthcare Solutions
 

security of computational systems and of communication networks

(versão PT)

Motivation and goals

The security of computer systems and communication networks has been evolving both in terms of attacking and defense techniques. Most scientific contributions are focused on the defense of computational systems to known attacks, essentially arguing that the main function of administrators and security related personnel should be defending their systems. Nonetheless, defending without proper knowledge of the procedures, motivations and techniques to attack computer systems lacks essential knowledge, required for a true defense consciousness. In recent years, motivated simultaneously by security related revelations, scientific advances and incidents reported by the international media, security, privacy and trustability in information systems have become major topics of interest, leading some to state that this year will be the year in which the information security related mechanisms will become even more mainstream. Curiously, this tendency seems to arise at the same time that new computing paradigms and technology emerge and get more mature, revealing new challenges that need to be addressed, namely in the cloud and mobile computing domains. On the other hand, cyberspace is nowadays considered the fifth war domain, motivating research and development of new defense and attacking mechanisms, sometimes supported by governmental institutions, of which some modern malware pieces are examples.

This session aims to promote the dissemination of scientific research works with emphasis on the potential for industrial, legal and military application. The debate and implied deepening of the knowledge regarding the application of offensive security techniques to the defense of computer systems and network communications is, in a society increasingly dependent of the cyberspace, of critical importance to persons from the academia and professionals working on the security domain. The consequences of the attacks in cyberspace, either in the cyber security or cyber defense domains, has assumed an increasingly dominant role in the normal functioning of societies and their sovereignty. It is assumed that the forums for discussing security of computer systems and communications networks, should promote the common good and the healthy debate among academic, industrial, legal and military forces.

Topics of interest

  • Network Security
  • Wireless Networks Security
  • Ad-Hoc Networks Security
  • Sensor Networks Security
  • Security in Distributed Systems
  • Trust in Computer Networks and Systems
  • Intrusion Detection Systems
  • Intrusion Tolerant Systems
  • Mobile and Pervasive Computing Security
  • Internet of Things Security
  • Security and Integrity of Data and Systems
  • Software Security
  • Hardware Based Security
  • Access Control
  • Authentication and Biometrics
  • Trust Management and Digital Entities
  • Anonymity and Privacy
  • Electronic voting
  • Security of Infrastructures for Critical Systems
  • Cryptography and Cryptanalysis
  • Formal Methods in Security
  • Security Models, Policies and Protocols
  • Language Based Security
  • Security in Web Applications and Services
  • Security in Databases
  • Cloud Security
  • Privacy and Reliability in the Cloud
  • Support to Legal Compliance in the Cloud
  • Cloud Forensic Computing
  • Privacy in Content Distribution Networks
  • Security in Social Networks
  • Incident Detection and Response
  • Offensive Security
  • Fighting Cybercrime
  • Crisis Management
  • Network-centric Operations
  • Information Security Management
  • Social Engineering
  • Cyber Defence
  • Cyber Security / Cyber Defence Strategy

Program Committee

  • Miguel Pardal, Instituto Superior Técnico, Universidade de Lisboa (Organization)
  • Miguel Pupo Correia, Instituto Superior Técnico, Universidade de Lisboa (Organization)
  • Carlos Ribeiro, Instituto Superior Técnico, Universidade de Lisboa
  • Carlos Serrão, ISCTE
  • Dulce Domingos, Faculdade de Ciências – Universidade de Lisboa / LASIGE
  • Edmundo Monteiro, Universidade de Coimbra
  • Henrique Domingos, Universidade Nova de Lisboa
  • Henrique Santos, Universidade do Minho
  • José Alegria, PT - Portugal Telecom
  • José Carlos Lourenço Martins, Academia Militar
  • José Manuel Valença, Universidade do Minho
  • Manuel Barbosa, Universidade do Minho
  • Marco Vieira, Universidade de Coimbra
  • Mário M. Freire, Universidade da Beira Interior
  • Mário Zenha Rela, Universidade de Coimbra
  • Nuno Neves, Faculdade de Ciências, Universidade de Lisboa
  • Nuno Santos, Instituto Superior Técnico, Universidade de Lisboa
  • Paulo Nunes, Academia Militar
  • Paulo Sousa, Maxdata Software
  • Pedro Adão, Instituto Superior Técnico, Universidade de Lisboa
  • Pedro Inácio, Universidade da Beira Interior
  • Ricardo Chaves, Instituto Superior Técnico, Universidade de Lisboa
  • Rui Miguel Silva, Lab UbiNET - Segurança Informática e Cibercrime / IPBeja
  • Salvador Pinto Abreu, Universidade de Évora
  • Susana Sargento, Universidade de Aveiro
  
Acções do Documento
organizacao-header

 

Universidade da Beira Interior

 

Faculdade de Ciências da Universidade do Porto

 

Instituto Superior Técnico

 

INESC Tecnologia e Ciência - INESC TEC

 

Inesc ID Lisboa

 

 
Sections