WG 11.4 Workshop – iNetSec 2017
Open Problems in Network Security
May 31, 2017

Rome, Italy
co-located with IFIP SEC 2017
call for papers

The iNetSec workshop will be co-located with the main conference IFIP SEC 2017 in Rome, Italy and is organized in conjunction with the IFIP WG 11.4 Network Security. The schedule of this workshop will be included in the SEC 2017 conference program.

In the past decade, computer networks have fundamentally influenced the ways in which information is exchanged and handled. Pervasive electronic devices make our everyday life easier, e.g., by helping us to connect with other people while being mobile, to use services available online, or to pay and use tolls and tickets. Many of the components employed routinely manage and distribute large amounts of data for different purposes. As these processes involve sensitive information, protecting information and the network with suitable security measures is more important than ever.

The objective of this one-day workshop (noon to noon) is to bring together researchers in the field of network security to discuss the open problems and future research directions.

call for papers


The iNetSec workshop seeks to bring together researchers to discuss open research problems in network security. We think that workshop discussions can contribute additional insights to the research community and should be an integral part of the paper publication process. Therefore, we encourage authors to submit abstracts of open problems that can be presented and discussed at the workshop. Authors of accepted abstracts will receive the opportunity to integrate suggestions induced by the discussions in their full papers after the workshop.

To this end, we solicit papers describing interesting unsolved problems and issues in (a certain area of) network security. Example areas include:

  • Future Internet
  • 5G Security and Privacy
  • Wireless mesh networks and protocols
  • Sensor nets & embedded systems
  • Identity & trust management
  • Cryptographic primitives & services
  • Security definitions and proofs
  • Anonymous networks
  • Cross layer security
  • Usage control
  • Trusted platforms
  • Forensics
  • Security policies
  • Dynamic composition of services



We ask authors to submit 1-2 page abstracts. They must be submitted electronically by April 9, 2017 (GTM 23:59), using the EasyChair system. Late submissions and non-electronic submissions will not be considered. Notification of acceptance or rejection based on the abstracts will be sent to authors by April 23, 2017.


Authors of accepted abstracts must guarantee that they will submit a full paper by May 16, 2017 via EasyChair and that their paper will be presented at the workshop. Papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference. They must be formatted according to the LNCS CS Proceedings and submitted as PDF documents. Graphics should be readable on black-and-white printouts. There is no page limitation for the full paper submission. However a limit of 15 pages would be targeted for the post-proceeding version.


Copies of the papers will be available at the workshop. Authors will be able to revise their papers after the workshop for the final version. These final papers will be published as post-proceedings Springer Publisher in the IFIP sub-series of Lecture Notes in Computer Science (LNCS). Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers.


Abstract Submission: March 26, 2017 (GTM 23:59) April 9, 2017 (GTM 23:59)

Abstract Acceptance Notification: April 16, 2017 April 23, 2017

Full Paper Submission: May 16, 2017

Post Proceeding: To be announced


Wednesday Event
12:35-14:00 Lunch Break
14:00-14:30 Vladimir Oleshchuk.
Trust-Aware Security for Disruption-Tolerant Networks
14:35-15:05 Sadaf Momeni, Tooska Dargahi and Hossein Shafiei.
Post Disaster Resilient Networks: Design Guidelines for Rescue Operations
15:10-15:40 Alfonso de La Rocha and Panos Papadimitratos.
Blockchain-based Public Key Infrastructure for Inter-Domain Secure Routing
15:40-16:10 Coffee Break
16:10-16:40 Stig F. Mjolsnes and Ruxandra F. Olimid.
The Challenge of Private Identification
16:45-17:15 Yudhistira Nugraha and Andrew Martin.
Understanding Security-related SLAs as Trust-Enhancing Instruments: Concepts, Approaches and Open Research Issues

Note: Presentations should not exceed 20 minutes to provide enough time for questions and answers.



Doğan Kesdoğan (University of Regensburg, Germany)


Muhammad Ajmal (Newcastle University, UK)

Roberto Di Pietro (Nokia Bell Labs, France)

Hannes Federrath (University of Hamburg, Germany)

Danilo Gligoroski (NTNU, Norway)

Doğan Kesdoğan (University of Regensburg, Germany)

Albert Levi (Sabanci University, Turkey)

Giovanni Livraga (Università degli Studi di Milano, Italy)

Javier Lopez (University of Malaga, Spain)

Vinh Pham (University of Regensburg, Germany)

Kai Rannenberg (Goethe University Frankfurt, Germany)

Siraj A. Shaikh (Coventry University, UK)



The workshop will be co-located with IFIP SEC 2017 in Rome, Italy. Please refer to the venue, travel and accommodation information from the IFIP SEC 2017 website.


Please register through the IFIP SEC 2017 registration website. It enables attending both, the IFIP SEC 2017 conference (May 29-31) and the iNetSec workshop (May 31). This joined registration is mandatory, even if you only intend to attend the workshop.


Information in accordance with section 5 TMG

Chair for information security management
University of Regensburg
Universitätsstraße 31
93059 Regensburg

Telephone: +49 941 943-5901
Fax: +49 941 943-5902
E-Mail: inetsec2017@easychair.org
Internet address: https://itsec.ur.de/inetsec2017/

Accountability for content

The contents of our pages have been created with the utmost care. However, we cannot guarantee the contents' accuracy, completeness or topicality. According to statutory provisions, we are furthermore responsible for our own content on these web pages. In this context, please note that we are accordingly not obliged to monitor merely the transmitted or saved information of third parties, or investigate circumstances pointing to illegal activity. Our obligations to remove or block the use of information under generally applicable laws remain unaffected by this as per §§ 8 to 10 of the Telemedia Act (TMG).

Accountability for links

Responsibility for the content of external links (to web pages of third parties) lies solely with the operators of the linked pages. No violations were evident to us at the time of linking. Should any legal infringement become known to us, we will remove the respective link immediately.


Our web pages and their contents are subject to German copyright law. Unless expressly permitted by law (§ 44a et seq. of the copyright law), every form of utilizing, reproducing or processing works subject to copyright protection on our web pages requires the prior consent of the respective owner of the rights. Individual reproductions of a work are allowed only for private use, so must not serve either directly or indirectly for earnings. Unauthorized utilization of copyrighted works is punishable (§ 106 of the copyright law).