Download

home heading

Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use

in conjunction with Pervasive 2010

Motivation

Mobile devices in general, and mobile phones in particular, present unique challenges not only in terms of user interface, battery life, and form factor, but also in terms of ensuring their users' privacy and security. Privacy and security are often in conflict with another and have been the topic of many research projects. Emerging mobile payment and ticketing solutions require the secure transmission and storage of financial information, while electronic health records or access certificates/tokens might imply the use of highly sensitive personal information on such devices. Securing the potentially massive amount of interactions using mobile devices is difficult, because typically there will be no a priori shared information such as passwords, addresses, or PIN codes between the phone, its user, and the service they want to use. Additionally, mobile devices often lack powerful user interfaces to support classical authentication methods.

The 2nd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use (IWSSI/SPMU'2010) provides a forum to discuss these challenges and to put forward an agenda for future research. The workshop is intended to foster cooperation between research groups and to establish a highly connected research community. Authors of selected workshop submissions will be invited to submit an extended version to a special issue in a renowned international journal.

Topics of Interest

  • Authentication methods for device pairing or user authentication
  • Sensor-, context-, and location-based authentication methods
  • Authorization, access control, and trust management
  • Logging and auditing of spontaneous mobile devce interactions
  • Network and system models
  • Security and privacy of mobile phone users
  • Security and privacy issues in mobile phone networks
  • Privacy and anonymous/pseudonymous interactions
  • User interfaces and models for user interaction on mobile devices
  • Making use of spontaneous interaction in applications
  • Public perception of security and privacy issues of mobile phones
  • Legal and social issues of security and privacy for mobile phones
  • Options for lawful, auditable, and restricted tracking and surveillance using mobile phones in law enforcement
some fancy images, not related
full paper submission: february 1 2010, notification: march 8 2010, cr deadline: march 31 2010