posted by system || 3255 views || tracked by 6 users: [display]

SEE 2009 : The 1st International Workshop on Security Engineering Environment

FacebookTwitterLinkedInGoogle

Link: http://www.aise.ics.saitama-u.ac.jp/SEE/index.html
 
When Dec 17, 2009 - Dec 19, 2009
Where Shanghai, China
Submission Deadline Jun 30, 2009
Notification Due Aug 20, 2009
Final Version Due Sep 20, 2009
Categories    security
 

Call For Papers

The 1st International Workshop on Security Engineering Environment
http://www.aise.ics.saitama-u.ac.jp/SEE/

in conjunction with FCST 2009
The 4th International Conference on Frontier of Computer Science and Technology
December 17-19, 2009, Shanghai, China
http://epcc.sjtu.edu.cn/fcst2009/index.php

*** Aim and Scope ***

As opposed to the discipline of software engineering to provide
principles, methodologies, and tools for designing, developing,
operating, and maintaining reliable software systems, the discipline
of security engineering is intended to provide principles,
methodologies, and tools for designing, developing, operating,
maintaining, and disposing of secure information systems.

An intrinsic difficulty in ensuring security of information systems
is that assailants (crackers) are active persons who can get
knowledge and skills day after day and then continuously attack
target information systems always with new techniques. Therefore,
designers, developers, users, and maintainers of information systems
that require high security need continuous supports for their tasks
to protect the system from assailants.

A Security Engineering Environment is an engineering environment that
integrates various tools and provides comprehensive facilities to
designers, developers, users, and maintainers of software systems
such that the designers, developers, users, and maintainers of any
target system can use the tools and facilities to ensure the whole
security of the target system anytime consistently and continuously.

The First International Workshop on Security Engineering Environment
aims to provide a forum for computer scientists, computer engineers,
software engineers, and application developers who are required to
design and develop information systems with high security to discuss
and exchange ideas, research results, and experience reports on
Security Engineering Environment.

*** Topics ***

Topics of interest include but are not limited to:

* Fundamentals of security engineering
* Assurance, privacy, security, and trust issues in software systems
* Information security standards
* Modeling for security engineering
* Methodologies for security engineering
* Methodologies and tools for requirement analysis of security functions
* Methodologies and tools for design and specification of security functions
* Methodologies and tools for verification and validation of security functions
* Methodologies and tools for measuring and monitoring security functions
* Methodologies and tools for testing and debugging security functions
* Methodologies and tools for maintaining security functions
* Integration of security engineering tools
* Run-time supporting environment for security engineering
* Continuous supporting environment for security engineering
* Case studies and experience reports on security engineering

*** Submission Guidelines ***

Submissions should include an abstract, 5-10 keywords, and the e-mail
address of the corresponding author and be in PDF format. Each
submission must not exceed 8 pages in the IEEE 8.5''x11'' two-column
format with 10-12 point font, including tables and figures. Each
submission should be regarded as an undertaking that, should the
submission be accepted, at least one of the authors must attend the
conference to present the work in order that the accepted paper can
be put into digital library. The final version of an accepted paper
will be limited to 6 pages in IEEE proceeding format.

All papers should be submitted using the submission system provided
by EasyChair (http://www.easychair.org/conferences/?conf=see09).

*** Publication ***

Accepted papers will be published in the FCST 2009 conference
proceedings by IEEE Computer Society, provided at least one author of
a paper registers the conference and presents the paper at the
workshop.

*** Important Dates ***

Paper submission: June 30, 2009
Notification of acceptance: August 20, 2009
Camera-ready paper due: September 20, 2009
Author registration: September 20, 2009

*** Organization Committee ***

Jingde Cheng, Saitama University, Japan
Yuichi Goto, Saitama University, Japan
Shoichi Morimoto, Senshu University, Japan

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
ITCCMA 2025   12th International Conference on Information Technology, Control, Chaos, Modeling and Applications
SANER 2026   The 33rd IEEE International Conference on Software Analysis, Evolution and Reengineering
MLNLP 2025   6th International Conference on Machine Learning Techniques and NLP
CIFEr 2026   IEEE Computational Intelligence in Financial Engineering and Economics
IEEE TPS 2025   IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
REFSQ 2026   International Working Conference on Requirements Engineering: Foundation for Software Quality
BDIoT 2025   6th International Conference on Big Data & IoT
ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications