posted by system || 2919 views || tracked by 6 users: [display]

SEE 2009 : The 1st International Workshop on Security Engineering Environment

FacebookTwitterLinkedInGoogle

Link: http://www.aise.ics.saitama-u.ac.jp/SEE/index.html
 
When Dec 17, 2009 - Dec 19, 2009
Where Shanghai, China
Submission Deadline Jun 30, 2009
Notification Due Aug 20, 2009
Final Version Due Sep 20, 2009
Categories    security
 

Call For Papers

The 1st International Workshop on Security Engineering Environment
http://www.aise.ics.saitama-u.ac.jp/SEE/

in conjunction with FCST 2009
The 4th International Conference on Frontier of Computer Science and Technology
December 17-19, 2009, Shanghai, China
http://epcc.sjtu.edu.cn/fcst2009/index.php

*** Aim and Scope ***

As opposed to the discipline of software engineering to provide
principles, methodologies, and tools for designing, developing,
operating, and maintaining reliable software systems, the discipline
of security engineering is intended to provide principles,
methodologies, and tools for designing, developing, operating,
maintaining, and disposing of secure information systems.

An intrinsic difficulty in ensuring security of information systems
is that assailants (crackers) are active persons who can get
knowledge and skills day after day and then continuously attack
target information systems always with new techniques. Therefore,
designers, developers, users, and maintainers of information systems
that require high security need continuous supports for their tasks
to protect the system from assailants.

A Security Engineering Environment is an engineering environment that
integrates various tools and provides comprehensive facilities to
designers, developers, users, and maintainers of software systems
such that the designers, developers, users, and maintainers of any
target system can use the tools and facilities to ensure the whole
security of the target system anytime consistently and continuously.

The First International Workshop on Security Engineering Environment
aims to provide a forum for computer scientists, computer engineers,
software engineers, and application developers who are required to
design and develop information systems with high security to discuss
and exchange ideas, research results, and experience reports on
Security Engineering Environment.

*** Topics ***

Topics of interest include but are not limited to:

* Fundamentals of security engineering
* Assurance, privacy, security, and trust issues in software systems
* Information security standards
* Modeling for security engineering
* Methodologies for security engineering
* Methodologies and tools for requirement analysis of security functions
* Methodologies and tools for design and specification of security functions
* Methodologies and tools for verification and validation of security functions
* Methodologies and tools for measuring and monitoring security functions
* Methodologies and tools for testing and debugging security functions
* Methodologies and tools for maintaining security functions
* Integration of security engineering tools
* Run-time supporting environment for security engineering
* Continuous supporting environment for security engineering
* Case studies and experience reports on security engineering

*** Submission Guidelines ***

Submissions should include an abstract, 5-10 keywords, and the e-mail
address of the corresponding author and be in PDF format. Each
submission must not exceed 8 pages in the IEEE 8.5''x11'' two-column
format with 10-12 point font, including tables and figures. Each
submission should be regarded as an undertaking that, should the
submission be accepted, at least one of the authors must attend the
conference to present the work in order that the accepted paper can
be put into digital library. The final version of an accepted paper
will be limited to 6 pages in IEEE proceeding format.

All papers should be submitted using the submission system provided
by EasyChair (http://www.easychair.org/conferences/?conf=see09).

*** Publication ***

Accepted papers will be published in the FCST 2009 conference
proceedings by IEEE Computer Society, provided at least one author of
a paper registers the conference and presents the paper at the
workshop.

*** Important Dates ***

Paper submission: June 30, 2009
Notification of acceptance: August 20, 2009
Camera-ready paper due: September 20, 2009
Author registration: September 20, 2009

*** Organization Committee ***

Jingde Cheng, Saitama University, Japan
Yuichi Goto, Saitama University, Japan
Shoichi Morimoto, Senshu University, Japan

Related Resources

ICGDA--EI 2025   2025 8th International Conference on Geoinformatics and Data Analysis (ICGDA 2025)
CSIA 2024   15th International Conference on Communications Security & Information Assurance
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
CMVIT-Maldives 2025   2025 9th International Conference on Machine Vision and Information Technology (CMVIT 2025)
ITCAU 2024   2nd International Conference on Information Technology, Control and Automation
S&P 2025   The 45th IEEE Symposium on Security and Privacy
CTCM 2024   10th International Conference of Control Theory and Computer Modelling
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing