Blockchain is a decentralized transaction and data management technology that was voiced by its implementation in Bitcoin. In recent years, Blockchain has been achieving an ever-growing popularity. The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third-party organization in control of the transactions, and therefore it is applied in numerous fields, including securing critical infrastructure.
As technology advanced, critical infrastructures increasingly come to rely on digital control systems and networking. Attacks on critical infrastructure sites are currently a fact of life rather than a potential threat. For example, power stations, chemical plants, telecommunication stations and nuclear facilities are tempting targets to cyber-attacks.
In this scene, the question remains on why and how we can utilize blockchain techniques to secure critical infrastructure. Prior methods of protecting critical infrastructure have been plagued by centralized weaknesses and single points of failure problems. Contemporarily, Blockchain can offer cryptography for transactions and data in trustless distributed networks to enhance the reliability and resilience of the critical infrastructure. In other words, increasingly open and security needs is forcing us to shore up defenses with developing blockchain technology to help secure distributed critical infrastructure.
The aim of this academic get-together, ACM International Symposium on Blockchain and Secure Critical Infrastructure, is to collect latest research results concerning Blockchain and secure critical infrastructure on relevant scenarios, such as the ones subsequently listed. Researchers, experts, and scholars from both industry and academia are encouraged to share their recent studies, investigations, and findings in this forum.
Topics of particular interest include, but are not limited to:
In addition to the technical research achievements, all qualified submissions in relevant subtopics (including novel industrial topics) not mentioned here are welcomed, too. Nevertheless, articles focusing on describing standards or commercial purposes are not considered as acceptable contents for this symposium. High quality submissions will be recommended to a few journal special issues that are currently being applied for.
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized and a DOUBLE-BLIND REVIEW policy will be applied during the review process. Submissions must be in double-column ACM SIG Proceedings format, and should not exceed the following page limit.
Position papers describing the work in progress are also welcome. Only pdf files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of the paper must be registered at the appropriate conference rate. Accepted papers will be published in the ACM Digital Library. This symposium will grant a few awards, including ACM Best Paper Award and ACM Best Student Award.
Paper submission site: https://easychair.org/conferences/?conf=bsci2020.
![]() |
Prof. Kui Ren's work on cloud security, Internet of things security and wireless security have made significant impact. He is the director of Institute of Cyberspace Research of Zhejiang University, IEEE Fellow, ACM Distinguished Member. He chaired and participated in projects from NSFC, NSF, US Department of Energy and Air Force Research Laboratory which cost more than $10 million. He was awarded Achievement Award of IEEE ComSoc, Sustained Achievement Award of exceptional scholar program of Suny Buffalo, and NSF youth Achievement Award. Prof. Kui Ren is internationally recognized for accomplishments in the areas of cloud security and wireless security. He has made many fundamental innovations in both theory and practice from the discipline to the society. His works have significant impact on emerging cloud systems and wireless network technologies. Prof. Kui Ren has published more than 200 papers, and cited more than 20 thousand times. His research results have been widely reported by Xinhua news agency, Scientific American, NSF news, ACM news and other media. |
---|