| |||||||||||||
SPattern 2009 : 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09)Conference Series : Secure Systems Methodologies Using Patterns | |||||||||||||
Link: http://www-ifs.uni-regensburg.de/spattern09/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
[Apologies for multiple copies of this announcement]
CALL FOR PAPERS *********************************************************************** 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09) in conjunction with the 6 th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'09) 20th International Conference on Database and Expert Systems Applications (DEXA 2009) Linz, Austria, August 31 - September 04, 2009 http://www-ifs.uni-regensburg.de/spattern09/ *********************************************************************** **************************** GOALS AND TOPICS OF INTEREST **************************** Security patterns have arrived to a stage where there are a significant number of them, two books about them have been published, and industry is starting to accept and use them. Analysis and design patterns have been around for about ten years and have found practical use in many projects. They have been incorporated into several software development methodologies where less experienced developers can use them to receive the advice and knowledge of experts. The situation is not so clear for security patterns because no accepted methodology exists for their use. Catalogs of security patterns are a good step, but they are not enough. Building secure systems is a difficult process where security aspects are interlaced with the satisfaction of functional requirements. Developers are typically experts on a language or a development methodology but know little about security, which results in them not knowing what security mechanisms make sense at which moments. We need methodologies that guide a designer at each stage of the development cycle. A few of them have appeared, but none of them has been tested in production applications. This workshop focuses on secure software methodologies. We seek papers describing individual security patterns, new methodologies, new aspects of existing methodologies, pattern languages to use in the methodologies, reference architectures, blueprints, and related aspects. Experiences in applying the methodologies to real situations are especially welcome. ****************** SUBMISSION DETAILS ****************** Authors are invited to submit research contributions, practical experience reports and demos. Papers must be original not previously published nor submitted in parallel for publication to any other conference, workshop or journal. Submissions must be in pdf and consist of no more than 5 pages in IEEE double column format. Accepted papers will be included in the DEXA workshop proceedings, to be published by IEEE and available at the conference site. Final versions of the papers must comply with "Authors Instructions" which are accessible at: www.computer.org/portal/site/cscps/index.jsp You are invited to submit your paper via DEXA'09 ConfDriver at: http://confdriver.ifs.tuwien.ac.at/. For further inquiries, please contact either of the program committee chairs. The conference organization office can be reached at office@dexa.org. At least one author of each accepted paper is required to attend the conference and present the paper. Her/his registration fee must be paid before May 31, 2009. Important dates: Submission of abstract March, 13th Submission of full paper March, 20th Notification to authors May, 8th Final version due May, 29th ***************** PROGRAM COMMITTEE ***************** Workshop chairs Eduardo B. Fernandez Florida Atlantic University (USA) Günther Pernul University of Regensburg (Germany) Program Committee Fernandez-Medina, Eduardo Universidad de Castilla-La Mancha (Spain) Heath, Craig Symbian (UK) Jürjens, Jan The Open University (UK) Lambrinoudakis, Kostas University of the Aegean (Greece) Maña, Antonio University of Malaga (Spain) Mouratidis, Haralambos University of East London (UK) Ray, Indrakshi Colorado State University (USA) Schumacher, Markus Virtual Forge GmbH & Fraunhofer SIT (Germany) Sommerlad, Peter HSR Hochschule für Technik Rapperswil (Switzerland) Thomsen, Dan Cyber Defense Agency (USA) VanHilst, Michael Florida Atlantic University (USA) Washizaki, Hironori National Institute of Informatics, Tokyo (Japan) Yoder, Joe The Refactory, Inc. (USA) Yoshioka, Nobukazu National Institute of Informatics, Tokyo (Japan) ******* CONTACT ******* Questions concerning the Call for Papers or submissions should be send by E-Mail to: guenther.pernul@wiwi.uni-regensburg.de or ed@cse.fau.edu Questions concerning the organization of the conference should be send by E-Mail to: office@dexa.org Prof. Dr. Eduardo B. Fernandez Professor of Computer Science & Engineering Department of Computer Science and Engineering Florida Atlantic University 777 Glades Road Boca Raton, FL 33431 - USA ed@cse.fau.edu Prof. Dr. Günther Pernul Department of Information Systems Universitätstr. 31 D-93053 Regensburg Germany guenther.pernul@wiwi.uni-regensburg.de |
|