The Fifth ACM/IEEE Symposium on Edge Computing (EdgeSP)
Event submitted on Tuesday, July 28th 2020, approved by Charles Villanueva ✓
This event has been tagged as follows:
I must admit that I had to Google, “Edge computing” and learned something! The concept refers to a “distributed computing paradigm that brings computation and data storage closer to the location where it is needed”; all of this is done to better improve response times and save on bandwidth expenses. So, if Edge Computing is a discipline and subject-matter that you’re interested in then we absolutely encourage you to attend this event in California. We have this event as being a physical, ‘in-person’ event but please, as ever, check that that is still the case for the “Fifth ACM/IEEE Symposium on Edge Computing.” We wish the organizers the best of luck with the west coast security event that really packs in a lot of information and subject-matter.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Tuesday, July 28th 2020, or created by us.
As the technologies of edge computing continue to advance, new security and privacy challenges and opportunities emerge, leading to the flourishing research on and fast development of various security solutions. The aim of this workshop is to provide a platform for researchers and practitioners to present advances in security and privacy-enhancing technologies in the emerging field of edge computing.
The workshop will be co-located with the Fifth ACM/IEEE Symposium on Edge Computing (SEC), November 13, 2020, in San Jose, CA, USA.
Authors are invited to submit previously unpublished papers offering novel research contributions addressing security and privacy issues in edge computing. Topics include, but are not limited to:
- Attacks and defenses
- Side-channel attacks and defenses for edge computing
- Intrusion detection and prevention
- Key Management for edge computing
- Mobile and Web security and privacy
- IoT security and privacy on edge computing
- Network and systems security
- Privacy technologies and mechanisms
- Protocol security
- Secure information flow
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security in content delivery
- Usable Security and privacy