INTRICATE-SEC 2017 
<https://goo.gl/DcbY4P>  
5th International Workshop on
Security Intricacies in Cyber-Physical Systems and Services, 
Taipei, Taiwan,
March 27-29, 2017. 
(Submissions due 1 October 2017) C

yber-physical systems
(CPS) are ubiquitous in critical infrastructures such as electrical power
generation, transmission, and distribution networks, water management, and
transportation, but also in both industrial and home automation. For
flexibility, convenience, and efficiency, CPS are increasingly supported by
commodity hardware and software components that are deliberately
interconnected using open standard general purpose information and
communication technology (ICT). The long life-cycles of CPS and increasingly
incremental changes to these systems require novel approaches to the
composition and inter-operability of services provided. The paradigm of
service-oriented architectures (SoA) has successfully been used in similar
long-lived and heterogeneous software systems. However, adapting the SoA
paradigm to the CPS domain requires maintaining the security, reliability
and privacy properties not only of the individual components but also, for
complex interactions and service orchestrations that may not even exist
during the initial design and deployment of an architecture. An important
consideration therefore is the design and analysis of security mechanisms
and architectures able to handle cross domain inter-operability over
multiple domains involving components with highly heterogeneous
capabilities. The INTRICATE-SEC workshop aims to provide a platform for
academics, industry, and government professionals to communicate and
exchange ideas on provisioning secure CPS and Services. 

We seek contributions focused on (but not limited to) the following topics: 

Anonymity and Pseudonymity 
Trust and Identity Management 
Authentication and Authorization 
Access Control Models 
Key Management, Applied Cryptographic Protocols/Schemes 
Privacy 
Malware Detection 
Phishing and Spam 
Trust and Identity Management 
Demand Management 
Scheduling 
Energy Management and Marketing Models 
Cloud Security 
Attack Models 
Scalability, Reliability and Safety 
Intrusion Detection and Response 
Legal and Regulatory Issues 
Vulnerability Analysis and Countermeasures 
Web Applications and Services 
Unconventional or Biologically Inspired Security Approaches

For more information please see https://goo.gl/562zhD