| |||||||||||||||
STPSA 2016 : IEEE International Workshop on Security, Trust, and Privacy for Software Applications | |||||||||||||||
Link: http://staging.computer.org/web/compsac2016/stpsa | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
=========================== Call for Papers ==============================
11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA) 2016 In conjunction with the 40th Annual IEEE Computer Software and Applications Conference (COMPSAC) 2016 -------------------------------------------------------------------------------------------------------------- Venue: Atlanta, Georgia, USA , June 10-14, 2016 Workshop Website: http://staging.computer.org/web/compsac2016/stpsa ** Paper Submission Deadline: March 06, 2016 ** -------------------------------------------------------------------------------------------------------------- GOALS This workshop will bring researchers from academia and industry to discuss methods and tools to achieve security, trust, and privacy goals of both pervasive and pervasive software applications. This workshop will focus on techniques, experiences and lessons learned with respect to the state of art for the security, trust, and privacy aspects of both pervasive and non-pervasive software applications along with some open issues. THEME Information security has become a major concern for both pervasive and non-pervasive software applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools to achieve security, trust, and privacy goals. As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications. SCOPE OF THE WORKSHOP Topics of interest include, but are not limited to, the following: • Security, trust, and privacy specific software development practices • Security, trust, and privacy requirements elicitation and specification • Models and languages for STP-aware software specification and design • Architecture for STP-aware software development • STP challenges for pervasive software applications • Testing security, trust, and privacy properties of both pervasive and non-pervasive software • STP management and usability issues in software applications • User interfaces for STP-aware pervasive and non pervasive software • Software reengineering for security, trust, and privacy for both pervasive and non pervasive applications • Tradeoffs among security, privacy, trust, and other criteria • STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce, e-marketing and other web-based and pervasive applications • STP challenges in mobile software applications • STP issues in sensor based software applications • User interfaces for secure and privacy-aware pervasive computing applications • STP-aware service discovery mechanisms for pervasive computing environments • Models for ensuring security, trust, and privacy in pervasive software applications • STP issues for handheld device software applications such as healthcare • Teaching STP-aware software development • Experience reports on developing STP-aware software IMPORTANT DATES March 06, 2016 deadline for paper submission March 28, 2016 notification of acceptance April 07, 2016 camera-ready due SUBMISSION Papers must be submitted electronically via the SPTPA 2016 Submission Page (will be available later). The format of submitted papers should follow the guidelines for the IEEE conference proceedings. All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the 40st IEEE Computer Software and Applications Conference (COMPSAC 2016) by the IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings. WORKSHOP ORGANIZERS General Chair: Mohammad Zulkernine School of Computing, Queen’s University Kingston, Ontario Canada K7L 3N6 Program Co-Chairs: Sheikh Iqbal Ahamed Marquette University, USA H. Takabi, University of North Texas, USA Publicity Chair: Mohammad Ashiqur Rahman Tennessee Tech University, USA GENERAL INQUIRIES For updated information, please contact the Program Co-Chair: Sheikh Iqbal Ahamed (sheikh.ahamed@marquette.edu) |
|