[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2660267.2660384acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
tutorial

Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)

Published: 03 November 2014 Publication History

Abstract

The Internet of Things (IoTS) is expected to seamlessly connect everything and everyone and bring about the promise of smart environments, industry 4.0, intelligent infrastructure management, environmental monitoring and disaster recover, etc. In fact, ABI Research [MI-ABI2013] and Gartner [MI-Gartner2013] estimate that there will be between 20 and 30 billion devices on the IoTS by 2020. The explosion in the number of interconnected devices makes it a challenge to guarantee their security, the security of their networks and the privacy of the data collected by them. The Workshop on Trustworthy Embedded Devices (TrustED) focuses on all aspects of security and privacy related to embedded systems and the IoTS. TrustED 2014 continues a successful series of workshops, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, and ACM CCS 2013 (see http://www.trusted-workshop.de for details). The goal of this workshop is to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems.

References

[1]
More than 30 billion devices will wirelessly connect to the internet of everything in 2020, May 9th, 2013. Available at: https://www.abiresearch.com/press/more-than-30-billion-devices-will-wirelessly-conne.
[2]
Gartner says the internet of things installed base will grow to 26 billion units by 2020, December 2013. Available at: http://www.gartner.com/newsroom/id/2636073.

Index Terms

  1. Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
      November 2014
      1592 pages
      ISBN:9781450329576
      DOI:10.1145/2660267
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 November 2014

      Check for updates

      Author Tags

      1. cryptography
      2. embedded devices
      3. security
      4. trusted

      Qualifiers

      • Tutorial

      Conference

      CCS'14
      Sponsor:

      Acceptance Rates

      CCS '14 Paper Acceptance Rate 114 of 585 submissions, 19%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 252
        Total Downloads
      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 02 Mar 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media