Posted on

UBITECH co-organizes a scientific workshop on Dependability and Safety Emerging Cloud and Fog Systems

With research and academic partners from the FutureTPM, ASTRID, CUREX and SECONDO H2020 European co-funded research projects, UBITECH co-organizes the 1st Workshop on Dependability and Safety Emerging Cloud and Fog Systems(DeSECSys) that will take place in September 17-18, 2020, in Guildford, United Kingdom, co-located with the 25th European Symposium on Research in Computer Security (ESORICS 2020).

Given that information security and privacy have already been established as some of the most crucial aspects of technology especially in a world that is migrating to digital applications by the day, this has inevitably led to the emergence of technologies that support the safety and dependability of the ever-increasing sensitive data handled by these applications. Additionally, besides these technologies which target security by their design, there are other technologies, such as machine learning, which could potentially be applied to security in innovative schemes. The goal of the DeSECSys workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various applications, opportunities and possible shortcomings of these technologies and their integration. Effectively the DeSECSys workshop aims to produce a collection of state-of-the-art research about emerging security technologies, their applications, their shortcomings and their verification with a focus on their uncompromised, in terms of security, safety and dependability, integration.

Topics of interest include but are not limited to: Emerging security and privacy technologies and solutions; Next-generation trustworthy computing security solutions and attacks (e.g., TPMs, TEEs, SGX, SE), and their impact; Utilization of novel artificial intelligence and machine learning based technologies in the context of security; Blockchain / Smart contracts for auditability and accountability; Fog Computing; Runtime risk assessment; Vulnerability Analysis; Formal Verification/Validation of design; Advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy); Impact of quantum computing on cyber-security (not limited to cryptography); Novel attacks and protection solutions in mobile, IoT and Cloud; Standardization of cyber security and trust techniques; Novel schemes for Trust and Reputation in Distributed Environments; Policy languages for advanced Access and Usage Control; Consensus mechanisms; Security in 5G networks.

We encourage all our research partners and collaborators to submit their manuscripts by June 21st, 2020. For more info, please visit