INTRICATE-SEC 2017 <https://goo.gl/DcbY4P> 5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services, Taipei, Taiwan, March 27-29, 2017. (Submissions due 1 October 2017) C yber-physical systems (CPS) are ubiquitous in critical infrastructures such as electrical power generation, transmission, and distribution networks, water management, and transportation, but also in both industrial and home automation. For flexibility, convenience, and efficiency, CPS are increasingly supported by commodity hardware and software components that are deliberately interconnected using open standard general purpose information and communication technology (ICT). The long life-cycles of CPS and increasingly incremental changes to these systems require novel approaches to the composition and inter-operability of services provided. The paradigm of service-oriented architectures (SoA) has successfully been used in similar long-lived and heterogeneous software systems. However, adapting the SoA paradigm to the CPS domain requires maintaining the security, reliability and privacy properties not only of the individual components but also, for complex interactions and service orchestrations that may not even exist during the initial design and deployment of an architecture. An important consideration therefore is the design and analysis of security mechanisms and architectures able to handle cross domain inter-operability over multiple domains involving components with highly heterogeneous capabilities. The INTRICATE-SEC workshop aims to provide a platform for academics, industry, and government professionals to communicate and exchange ideas on provisioning secure CPS and Services. We seek contributions focused on (but not limited to) the following topics: Anonymity and Pseudonymity Trust and Identity Management Authentication and Authorization Access Control Models Key Management, Applied Cryptographic Protocols/Schemes Privacy Malware Detection Phishing and Spam Trust and Identity Management Demand Management Scheduling Energy Management and Marketing Models Cloud Security Attack Models Scalability, Reliability and Safety Intrusion Detection and Response Legal and Regulatory Issues Vulnerability Analysis and Countermeasures Web Applications and Services Unconventional or Biologically Inspired Security Approaches For more information please see https://goo.gl/562zhD