Interconnected Web Ecosystem

Abstract submissions due: 1 March 2015
Articles due to ScholarOne: 1 April 2015
Publication date: Jan/Feb 2016
Author guidelines: http://www.computer.org/portal/web/peerreviewmagazines/acsecurity

The Web is being fused into the human experience in a number of interesting ways; leading to the creation of an intricate system of systems, which merges the Web with traditional systems in fascinating ways. For example, infant monitoring devices provide parents with real-time information about their baby's breathing, skin temperature, body position, and activity level on their smartphones. ‘Smart' prescription bottles help people stick to their prescription regimen via wireless Web-enabled chips. Thermostat units interface with the Web to help a household manage their utility bills. Cities optimize revenue, parking space availability and enable citizens to reduce their environmental impact by helping them quickly find open parking spots by leveraging Web technologies. Cars are fitted with on-board computer units that monitor road conditions, maximize fuel efficiency, and connect to the Web to play music, get stock quotes, retrieve email, etc. Unfortunately, this Web-enabled interconnectedness has opened up a host of serious security, privacy and dependability concerns.

A single flaw (or feature) in Web technology has the potential to have significant, unforeseen negative consequences on a myriad of interconnected systems. Pacemakers may be hijacked and rebooted. Customers of Target had their information stolen because of the computer systems of one of Target's partners, who supplied their heating and air-conditioning systems. Hackers have shown how to compromise automobile brakes via a car's music system. The dangers of and the magnitude of the incurred damage from these attacks, which leverage components of the Web ecosystem to compromise other interconnected systems, will only increase as time goes by.

The anonymity of (some) online interactions and the practice of having multiple identities (in other contexts) also makes the security and privacy landscape of the Web ecosystem interesting, complex and filled with interesting challenges that need to addressed for this ever emerging environment. Even more problematic for system developers, researchers and policy makers will be the issues around indemnification and liability as the consequences of breaches become more severe and unpredictable.

However, the march to an even more interconnected Web of technology systems is pressing on and doing so at a rapid pace. The adoption of the Internet of Things vision, the rush to create Big Data solutions and the drive to leverage the economies of scale gained by using Cloud systems are all evidence of this progression. This heightens the need to address these issues before it is too late. Articles should address questions such as:

  • What are the existing Security, Privacy & Dependability problems in an Interconnected Web Environment? What are the possible solutions? Are they usable?
  • What Identity, Pseudonymity, Anonymity and Reputation controls need to be in place?
  • How does one handle Provenance, Governance and Liability concerns?

Submission Guidelines

Submissions will be subject to the IEEE Computer Society's peer-review process, and later, to the Computer Society editing process. Articles should be at most 6,000 words, with a maximum of 15 references, and should be understandable to a broad audience of people interested in security, privacy and dependability. The writing style should be down to earth, practical, and original. Authors should not assume that the audience will have specialized experience in a particular subfield. All accepted articles will be edited by a staff editor according to the IEEE Computer Society style guide. Submit your papers to Scholar­One at https://mc.manuscriptcentral.com/cs-ieee.

Questions?

Contact the Guest Editors: