Reference no: EM131077044 , Length: word count:4000
Assignment - Infosec Conferences
Summary The world of information security conferences is split into two quite distinct streams - A) academic and B) industry/hacker. The purpose of Assignment is to introduce you to these, and to allow you to explore contemporary research in both streams.
Pick two conference talks or papers, one from a Group A conference and one from a Group B conference. Summarize and review each paper. Each summary and review should be 1200 - 1500 words long. Finally, add 500 - 1000 words summarizing the differences you have discovered between the two types of conferences and their submissions.
In reviewing each talk or paper, consider the following questions:
• What is the major contribution of the paper, in your opinion? Is it the same as the authors believe it to be? How significant is it?
• How original is the work? Does it report on a new and original idea?
• Who is the intended audience for this paper?
• Does the paper represent a platform for future work? Can readers or conference attendees use the ideas presented in their own work?
• The paper was accepted, or we would not be considering it here. Should it have been?
Group A: Academic Conferences
IEEE Conference on Communications and Network Security
2013: https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=30457
2014: https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=31964
2015: https://cns2015.ieee-cns.org/
IEEE TrustCom (IEEE International Conference on Trust, Security and Privacy in Computing and Communications)
2013: https://anss.org.au/trustcom2013/
2014: https://www.greenorbs.org/TrustCom2014/
2015: https://research.comnet.aalto.fi/Trustcom2015/
ACM SACMAT (Symposium on Access Control Models and Technologies)
2013: https://www.sacmat.org/2013/index.php
2014: https://www.sacmat.org/2014/index.php
2015: https://www.sacmat.org/2015/index.php
ACM CCS (Conference on Computer and Communications Security)
2013: https://www.sigsac.org/ccs/CCS2013/
2014: https://www.sigsac.org/ccs/CCS2014/
2015: https://www.sigsac.org/ccs/CCS2015/
Crypto
Proceedings are online at
2013: https://www.iacr.org/conferences/crypto2013/
2014: https://www.iacr.org/conferences/crypto2014/
2015: https://www.iacr.org/conferences/crypto2015/
Talks online at https://www.iacr.org/proceedings/ and via SpringerLink
Group B: Industry and Hacker Conferences
Chaos Communications Congress
2013: https://media.ccc.de/browse/congress/2013/
2014: https://media.ccc.de/browse/congress/2014/
2015: https://media.ccc.de/c/32c3
Black Hat (US)
2013: https://www.blackhat.com/us-13/archives.html
2014: https://www.blackhat.com/us-14/archives.html
2015: https://www.blackhat.com/us-15/briefings.html.
Recommend that private-sector employees
: Would you recommend that private-sector employees be permitted to offer non exempt employees compensatory time off rather than pay for overtime hours worked?
|
Plan a complete tripto a city outside of north america
: Plan a complete trip (7-10 days) to a city/country outside of North America and on a continent other than your heritage (YOU MUST EMAIL MEAND I WILL ASSIGN THE COUNTRY).
|
Evaluate the inherit risk of employee access to funds
: Evaluate the inherit risk of employee access to funds and other assets, indicating how internal controls can minimize the risk. Explain your rationale.
|
What is the transverse velocity of the string particle
: What is the transverse velocity of the string particle
|
Does the paper represent a platform for future work
: In reviewing each talk or paper, consider the following questions: What is the major contribution of the paper, in your opinion? Does the paper represent a platform for future work? Can readers or conference attendees use the ideas presented in the..
|
Natural style of writing for most people
: This essay explores the narrative mode, which is perhaps the most natural style of writing for most people. The narrative form has much in common with fiction or creative writing, in that it relies on descriptive language, dialogue, and dramatic a..
|
Table or chart listing product-price-place
: You will analyze the 4 P's for your brand (VictoriaBeckham). Again, the 4 P's was in the reading material (price, product, place, promotion). This can be completed on a table or chart listing product, price, place (online, brick, other, both), and..
|
Is there a gap in the knowledge that you can fill
: A desire to ‘know' more, a passion for a field of study and the motivation to do something for the ‘greater good' are important for researchers to enjoy and gain satisfaction from their work. Consider this scenario - Does something pique y..
|
Concerning the sharing of that knowledge
: Q1: What steps were taken to consolidate and safeguard the knowledge gained during execution of the Project; that is, to benefit from "lessons learned?" Q2: What decisions were made concerning the sharing of that knowledge?
|