Explore contemporary research in information security

Assignment Help Management Information Sys
Reference no: EM131099710

Assignment - Infosec Conferences

Summary The world of information security conferences is split into two quite distinct streams -

A) academic and

B) industry/hacker.

The purpose of Assignment is to introduce you to these, and to allow you to explore contemporary research in both streams.

Pick two conference talks or papers, one from a Group A conference and one from a Group B conference. Summarize and review each paper. Each summary and review should be 1200 - 1500 words long. Finally, add 500 - 1000 words summarizing the differences you have discovered between the two types of conferences and their submissions.

In reviewing each talk or paper, consider the following questions:

• What is the major contribution of the paper, in your opinion? Is it the same as the authors believe it to be? How significant is it?

• How original is the work? Does it report on a new and original idea?

• Who is the intended audience for this paper?

• Does the paper represent a platform for future work? Can readers or conference attendees use the ideas presented in their own work?

• The paper was accepted, or we would not be considering it here. Should it have been?

Group A: Academic Conferences

IEEE Conference on Communications and Network Security

2013: https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=30457

2014: https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=31964

2015: https://cns2015.ieee-cns.org/

IEEE TrustCom (IEEE International Conference on Trust, Security and Privacy in Computing and Communications)

2013: https://anss.org.au/trustcom2013/

2014: https://www.greenorbs.org/TrustCom2014/

2015: https://research.comnet.aalto.fi/Trustcom2015/

ACM SACMAT (Symposium on Access Control Models and Technologies)

2013: https://www.sacmat.org/2013/index.php

2014: https://www.sacmat.org/2014/index.php

2015: https://www.sacmat.org/2015/index.php

ACM CCS (Conference on Computer and Communications Security)

2013: https://www.sigsac.org/ccs/CCS2013/

2014: https://www.sigsac.org/ccs/CCS2014/

2015: https://www.sigsac.org/ccs/CCS2015/

Crypto Proceedings are online at

2013: https://www.iacr.org/conferences/crypto2013/

2014: https://www.iacr.org/conferences/crypto2014/

2015: https://www.iacr.org/conferences/crypto2015/

Talks online at https://www.iacr.org/proceedings/ and via SpringerLink

Group B: Industry and Hacker Conferences

Chaos Communications Congress

2013: https://media.ccc.de/browse/congress/2013/

2014: https://media.ccc.de/browse/congress/2014/

2015: https://media.ccc.de/c/32c3

Black Hat (US)

2013: https://www.blackhat.com/us-13/archives.html

2014: https://www.blackhat.com/us-14/archives.html

2015: https://www.blackhat.com/us-15/briefings.html

Reference no: EM131099710

Questions Cloud

How does literary representation of historical events : In two to three pages(excluding title and reference pages), explain in your own words what cultural memory is and apply this concept to literature. How does literary representation of historical events help create our sense of cultural identity? C..
Typical phases of operation of a virus or worm : 1. What are typical phases of operation of a virus or worm? 2. What is a digital immune system
Determine a physical layout of the computers on floor plan : Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram). Provide justifications for each element of your network design (numbers 1-4 above)
How much will the investors still have to pay after 5 years : A group of investors purchased a condominium complex for $2 million. they an initial down payment of 10% and obtained financing for the balance. the loan is to be amortized over 15 years at an interest rate of 12% per year compounded quarterly. How m..
Explore contemporary research in information security : The purpose of Assignment is to introduce you to these, and to allow you to explore contemporary research in both streams
Stock market game outline and grading rubric : We will be playing a stock market game for approximately 4 weeks. Below are the rules of the game, which you should read carefully. Failure to meet all the requirements of the game will negatively impact your grade on the project.
Probability of completing the exam : 1. The time needed to complete a final examination in a particular college course is normally distributed with a mean of 79 minutes and a standard deviation of 8 minutes. Answer the following questions. a. What is the probability of completing the..
Compute the input capacitance of the circuit : compute the input capacitance of the circuit.
Bureau of transportation statistics website : The mean cost of domestic airfares in the United States rose to an all-time high of $385 per ticket (Bureau of Transportation Statistics website, November 2, 2012). Airfares were based on the total ticket value, which consisted of the price charge..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd