posted by user: nightsh || 6878 views || tracked by 13 users: [display]

STPSA 2011 : (Deadline Extended) The 6th IEEE International Workshop on Security, Trust, and Privacy for Software Applications

FacebookTwitterLinkedInGoogle

Link: http://compsac.cs.iastate.edu/workshop_details.php?id=30&y=
 
When Jul 18, 2011 - Jul 22, 2011
Where Munich, Germany
Submission Deadline Apr 8, 2011
Notification Due Apr 20, 2011
Final Version Due May 2, 2011
Categories    security   privacy   trust   software application
 

Call For Papers

[Apologies if you receive multiple copies of this message]


CALL FOR PAPERS

The 6th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2011)
Held in conjunction with COMPSAC, the IEEE Signature Conference on Computers, Software, and Applications

Website: http://compsac.cs.iastate.edu/workshop_details.php?id=30&y=

July 18-22, 2011
Munich, Germany


This workshop will bring researchers from academia and industry to discuss methods and tools to achieve security, trust, and privacy goals of both pervasive and pervasive software applications. This workshop will focus on techniques, experiences and lessons learned with respect to the state of art for the security, trust, and privacy aspects of both pervasive and non-pervasive software applications along with some open issues.

Information security has become a major concern for both pervasive and non-pervasive software applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools to achieve security, trust, and privacy goals.

As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.


Topics of interest include, but are not limited to, the following:

* Security, trust, and privacy specific software development practices
* Security, trust, and privacy requirements elicitation and specification
* Models and languages for STP-aware software specification and design
* Architecture for STP-aware software development
* STP challenges for pervasive software applications
* Testing security, trust, and privacy properties of both pervasive and non-pervasive software
* STP management and usability issues in software applications
* User interfaces for STP-aware pervasive and non pervasive software
* Software reengineering for security, trust, and privacy for both pervasive and non pervasive applications
* Tradeoffs among security, privacy, trust, and other criteria
* STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce, e-marketing and other web-based and pervasive applications
* STP challenges in mobile software applications
* STP issues in sensor based software applications
* User interfaces for secure and privacy-aware pervasive computing applications
* STP-aware service discovery mechanisms for pervasive computing environments
* Models for ensuring security, trust, and privacy in pervasive software applications
* STP issues for handheld device software applications
* Teaching STP-aware software development
* Experience reports on developing STP-aware software


IMPORTANT DATES

April 8, 2011: Workshop paper submission (extended)
April 20, 2011: Workshop paper author notification
May 2, 2011: Camera-ready & author registration


SUBMISSION

Papers must be submitted electronically via the SPTPA 2011 Submission Page at http://compsac.cs.iastate.edu/workshop_details.php?id=30&y= lease follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers http://www.computer.org/portal/web/cscps/ submission. All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2011) by the IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings. Each accepted paper must be presented in person by an author.


WORKSHOP ORGANIZERS

Program Co-Chairs:

Dr. Lingyu Wang
Associate Professor
Concordia Institute for Information Systems Engineering
Concordia University
Montreal, Quebec, Canada H3G1M8
Email: wang@ciise.concordia.ca

Dr. Sushil Jajodia
University Professor and BDM International Professor
Director of Center for Secure Information Systems
George Mason University
Fairfax, Virginia, USA 22030-4422
Email: jajodia@gmu.edu


Program Committee:

Sheikh Iqbal Ahamed, Marquette University, USA
John Buford, Avaya lab, USA
Weifeng Chen, California University of Pennsylvania, USA
Mourad Debbabi, Concordia University, Canada
Stephan Eidenbenz, Los Alamos National Laboratory, USA
Yingjiu Li, Singapore Management University, Singapore
Mattia Monga, Universita degli Studi di Milano, Milan, Italy
Kui Ren, Illinois Institute of Technology, USA
Issa Traroe, University of Victoria, Canada
Guanhua Yan, Los Alamos National Laboratory, USA
George Yee, NRC Canada, Canada
Amr Youssef, Concordia University, Canada
Wensheng Zhang, Iowa State University, USA
Mohammad Zulkernine, Queen's University, Canada


GENERAL INQUIRIES

For updated information, please contact Lingyu Wang (wang@ciise.concordia.ca)
For COMPSAC’11, please visit http://compsac.cs.iastate.edu/

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
CETA 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
IARIA Congress 2025   The 2025 IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3