| |||||||||||||||||
MDsec 2012 : International Workshop on Model-Driven Security | |||||||||||||||||
Link: http://mdsec2012.pst.ifi.lmu.de/ | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
------------------------------------------
MDSec 2012 - Call for Papers ------------------------------------------ International Workshop on Model-Driven Security MoDELS 2012 satellite event October 1st, 2012 – Innsbruck (Austria) http://mdsec2012.pst.ifi.lmu.de ------------------------------------------ Overview: ------------------------------------------ Over the last years, we have seen many efforts invested in research on engineering security aspects of software and systems. But we have also seen spectacular security breaches and privacy leaks in web applications, mobile apps, and enterprise systems. In fact, in both the industrial and the academic context, we are still far from satisfactory, integrative development approaches covering the many different facets of security, like access control, secure user interaction, privacy, secure protocols, trustworthiness, etc. Model-driven and model-based approaches to security integrate security aspects in the early phases of software development and at an abstract level. They thus pave the way to reduce the gap between security requirements and their enforcement mechanisms and to verify security properties on an appropriate level of detail and following the principle of separation of concerns. Designers can decouple functional architecture from mechanisms that ensure the security properties of the system. The main objective of this Model-Driven Security workshop is to bring together researchers and practitioners to discuss the approaches, key issues, innovative applications, and trends in model-driven engineering of secure software and systems. This workshop solicits original research contributions, experience reports and industrial position papers related to (but not limited to) the following topics of interest: ------------------------------------------ Topics of interest: ------------------------------------------ - Model-driven development of secure software and systems - Domain-specific modeling languages (DSML) for secure software - Modeling privacy for software systems - Specification of security and privacy requirements and policies - Model-based generation of test cases for security aspects - Model-based dynamic security adaptation - Model-based composition of security concerns - Security and privacy preserving model transformations - Security model analysis and implementation - Model-based verification techniques for security properties - Threats, vulnerability, and trust modeling - Modeling security and privacy for different application domains, like social networks, mobile apps, health-care ------------------------------------------ Submissions: ------------------------------------------ Full papers should be up to 15 pages in length in ACM small standard format style (http://www.acm.org/publications/latex_style/acm-small-v1-2.zip), short papers up to 8 pages and position papers of 2 pages. Papers must be submitted through Easychair (https://www.easychair.org/conferences/?conf=mdwe2012). The program committee will peer-review the submissions and select papers according to their relevance and interest for the discussions that will take place at the workshop. Accepted papers will be made available before the workshop, on the workshop web page. Polished versions of accepted full and short papers will be published in in the ACM Digital Library (DL). ------------------------------------------ Important Dates: ------------------------------------------ Abstract submission deadline: 19 July, 2012 Submission deadline: 26 July, 2012 Notification to authors: 30 August, 2012 Final version for website publication 17 September, 2012 Workshop dates 1 October, 2012 Final version for ACM DL publication (after the workshop, to be announced) ------------------------------------------ Program Committee: ------------------------------------------ Dhouha Ayed, THALES Group, France David Basin, ETH Zurich, Switzerland Behzad Bordbar, School of computer Science, University of Birmingham, UK Achim Brucker, SAP Research, Germany Fabian Büttner, INRIA Nantes, France Manuel Clavel, IMDEA Software/Complutense University of Madrid, Spain Jorge Cuellar, Siemens AG, Germany Siv Hilde Houmb, Secure-Nok, Norway Wouter Joosen, Katholieke Universiteit Leuven, Belgium Jan Jürjens, Technical University Dortmund, Germany Javier Lopez, Universidad de Malaga, Spain Fabio Martinelli, CNR, Italy Roie Melamed, IBM Haifa, Israel Aljosa Passic, Atos, Spain Miguel Ponce de León, Waterford Institute of Technology, Ireland Kurt Stenzel, University of Augsburg, Germany Ketil Stølen, SINTEF/University of Oslo, Norway ------------------------------------------ Organizing Committee: ------------------------------------------ Benoit Baudry, INRIA, Rennes, France Marina Egea, Atos, Spain Geri Georg, Colorado State University, U.S.A. Alexander Knapp, University of Augsburg, Germany Nora Koch, Ludwig-Maximilians-University of Munich and NTTDATA, Germany |
|