International Invited Workshop on the Theories and Intricacies of Information Security problems (INTRICATE-SEC 2015) Gwangju, Korea March 25, 2015 Paper Submission Deadline: October 10, 2014 Author Notification: November 30, 2014 Final Manuscript Due: December 05, 2014 Author Registration: January 15, 2015 INTRICATE-SEC 2015: The INTRICATE-SEC workshop is aimed at information security researchers with an interest in designing privacy as well as security solutions for service oriented architectures in technology constrained resource settings. Technological advances in hardware and software have made performance a strong consideration in security/privacy solution design. Additionally, technologies such as cloud computing and service oriented architectures also make supporting user and provider requirements an important consideration. However, requirements of high performance are impractical for service oriented architectures that are deployed in technology constrained environments. Furthermore, since the user requirements are by necessity different, new solution approaches are needed in order to guarantee privacy and security in these settings. The first two editions of the workshop, held in conjunction with the Information Security South Africa Conference (ISSA), focused networked and Internetwork environments, resulting in a book entitled "Information Security in Diverse Computing Environments". This year, we invite papers centered on the themes of "Cyber Security, Energy Distribution (smart grids, metering,...)", and "Internet-of-Things", presenting new paradigms, architectures, and/or algorithms supported by practical examples highlighting the intricacies of addressing security and privacy issues in low technology resource settings. Possible topics include, but are not limited to: Anonymity Authentication and Authorization Access Control Key Management Human Issues in Security Usable Security New Security Paradigms Trust Management Identity Management Privacy Cyber-Physical Systems Security Energy Systems Security For more information, please see http://infosec.cs.uct.ac.za/INTRICATE-SEC/index.php