Explore contemporary research in information security

Assignment Help Management Information Sys
Reference no: EM131099710

Assignment - Infosec Conferences

Summary The world of information security conferences is split into two quite distinct streams -

A) academic and

B) industry/hacker.

The purpose of Assignment is to introduce you to these, and to allow you to explore contemporary research in both streams.

Pick two conference talks or papers, one from a Group A conference and one from a Group B conference. Summarize and review each paper. Each summary and review should be 1200 - 1500 words long. Finally, add 500 - 1000 words summarizing the differences you have discovered between the two types of conferences and their submissions.

In reviewing each talk or paper, consider the following questions:

• What is the major contribution of the paper, in your opinion? Is it the same as the authors believe it to be? How significant is it?

• How original is the work? Does it report on a new and original idea?

• Who is the intended audience for this paper?

• Does the paper represent a platform for future work? Can readers or conference attendees use the ideas presented in their own work?

• The paper was accepted, or we would not be considering it here. Should it have been?

Group A: Academic Conferences

IEEE Conference on Communications and Network Security

2013: https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=30457

2014: https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=31964

2015: https://cns2015.ieee-cns.org/

IEEE TrustCom (IEEE International Conference on Trust, Security and Privacy in Computing and Communications)

2013: https://anss.org.au/trustcom2013/

2014: https://www.greenorbs.org/TrustCom2014/

2015: https://research.comnet.aalto.fi/Trustcom2015/

ACM SACMAT (Symposium on Access Control Models and Technologies)

2013: https://www.sacmat.org/2013/index.php

2014: https://www.sacmat.org/2014/index.php

2015: https://www.sacmat.org/2015/index.php

ACM CCS (Conference on Computer and Communications Security)

2013: https://www.sigsac.org/ccs/CCS2013/

2014: https://www.sigsac.org/ccs/CCS2014/

2015: https://www.sigsac.org/ccs/CCS2015/

Crypto Proceedings are online at

2013: https://www.iacr.org/conferences/crypto2013/

2014: https://www.iacr.org/conferences/crypto2014/

2015: https://www.iacr.org/conferences/crypto2015/

Talks online at https://www.iacr.org/proceedings/ and via SpringerLink

Group B: Industry and Hacker Conferences

Chaos Communications Congress

2013: https://media.ccc.de/browse/congress/2013/

2014: https://media.ccc.de/browse/congress/2014/

2015: https://media.ccc.de/c/32c3

Black Hat (US)

2013: https://www.blackhat.com/us-13/archives.html

2014: https://www.blackhat.com/us-14/archives.html

2015: https://www.blackhat.com/us-15/briefings.html

Reference no: EM131099710

Questions Cloud

How does literary representation of historical events : In two to three pages(excluding title and reference pages), explain in your own words what cultural memory is and apply this concept to literature. How does literary representation of historical events help create our sense of cultural identity? C..
Typical phases of operation of a virus or worm : 1. What are typical phases of operation of a virus or worm? 2. What is a digital immune system
Determine a physical layout of the computers on floor plan : Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram). Provide justifications for each element of your network design (numbers 1-4 above)
How much will the investors still have to pay after 5 years : A group of investors purchased a condominium complex for $2 million. they an initial down payment of 10% and obtained financing for the balance. the loan is to be amortized over 15 years at an interest rate of 12% per year compounded quarterly. How m..
Explore contemporary research in information security : The purpose of Assignment is to introduce you to these, and to allow you to explore contemporary research in both streams
Stock market game outline and grading rubric : We will be playing a stock market game for approximately 4 weeks. Below are the rules of the game, which you should read carefully. Failure to meet all the requirements of the game will negatively impact your grade on the project.
Probability of completing the exam : 1. The time needed to complete a final examination in a particular college course is normally distributed with a mean of 79 minutes and a standard deviation of 8 minutes. Answer the following questions. a. What is the probability of completing the..
Compute the input capacitance of the circuit : compute the input capacitance of the circuit.
Bureau of transportation statistics website : The mean cost of domestic airfares in the United States rose to an all-time high of $385 per ticket (Bureau of Transportation Statistics website, November 2, 2012). Airfares were based on the total ticket value, which consisted of the price charge..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Development of an it project by the project manager

The problem belongs to Management and it is a scenario where documentation has to be submitted for the project development of an IT project by the project manager. The project belongs to a large company where the record of 30000 employees has to b..

  What are the steps to locate and correct the error

You just received the EOB for Violet Sims, a patient in your medical office. What information should be checked before posting payment and why? If an error has been identified on Violet's EOB, what are the steps to locate and correct the error

  How the internet and the web make e-commerce possible

Explain how the Internet and the Web make e-commerce possible. Briefly discuss at least sixfeatures or services that support e-commerce.

  Global value chain and global supply chain management

Global value chain and global supply chain management - describe which is used in the money transfer business , and why it is used. Be sure to cite your references in your analysis.

  Paper on preventing session hijacking in cloud computing

Write a paper on Preventing Session Hijacking in Cloud Computing

  Prepare a three page memorandum

Prepare a three page memorandum that examines an opt-in vs opt-out startegy for an online buiness to daopt. 3 external reference must be cited.

  Describe a fictional healthcare organization

Describe a fictional healthcare organization: type, size of staff, and amount and type of patients it is able to serve

  Network solutions inc nsi provides network services

network solutions inc nsi provides network services to...network solutions inc nsi provides network services to large

  Write the your company it planning

Write the Your Company's IT Planning and Analysis Processes section of your term paper

  Step-wise answer to discussion questions

Step-wise answer to Discussion Questions - How many users, and which ones, should be involved in developing the system needs?

  Show the role of external support

IT projects and the role of external support - formal project sponsor and champion, which business managers played these roles, and whether or not you think their roles positively affected the project outcomes.

  Describe the major functions of the is department

Describe the major functions of the IS department. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd