International Invited Workshop on the Theories and Intricacies of
Information Security problems (INTRICATE-SEC 2015)

Gwangju, Korea
March 25, 2015

    Paper Submission Deadline: October 10, 2014
    Author Notification: November 30, 2014
    Final Manuscript Due: December 05, 2014
    Author Registration: January 15, 2015

INTRICATE-SEC 2015: The INTRICATE-SEC workshop is aimed at information
security researchers with an interest in designing privacy as well as
security solutions for service oriented architectures in technology
constrained resource settings. Technological advances in hardware and
software have made performance a strong consideration in
security/privacy solution design. Additionally, technologies such as
cloud computing and service oriented architectures also make
supporting user and provider requirements an important
consideration. However, requirements of high performance are
impractical for service oriented architectures that are deployed in
technology constrained environments. Furthermore, since the user
requirements are by necessity different, new solution approaches are
needed in order to guarantee privacy and security in these settings.

The first two editions of the workshop, held in conjunction with the
Information Security South Africa Conference (ISSA), focused networked
and Internetwork environments, resulting in a book entitled
"Information Security in Diverse Computing Environments". This year,
we invite papers centered on the themes of "Cyber Security, Energy
Distribution (smart grids, metering,...)", and "Internet-of-Things",
presenting new paradigms, architectures, and/or algorithms supported
by practical examples highlighting the intricacies of addressing
security and privacy issues in low technology resource settings.

Possible topics include, but are not limited to: 
Anonymity
Authentication and Authorization 
Access Control
Key Management
Human Issues in Security
Usable Security
New Security Paradigms
Trust Management
Identity Management
Privacy
Cyber-Physical Systems Security 
Energy Systems Security 

For more information, please see
http://infosec.cs.uct.ac.za/INTRICATE-SEC/index.php