posted by user: lwang3gmu || 5806 views || tracked by 9 users: [display]

STPSA 2012 : The 7th IEEE International Workshop on Security, Trust, and Privacy for Software Applications

FacebookTwitterLinkedInGoogle

Link: http://compsac.cs.iastate.edu/workshop_details.php?id=47&y
 
When Jul 16, 2012 - Jul 20, 2012
Where Izmir, Turkey
Submission Deadline Mar 30, 2012
Notification Due Apr 20, 2012
Final Version Due May 2, 2012
Categories    security   privacy   trust   software
 

Call For Papers

[Apologies if you receive multiple copies of this message]


CALL FOR PAPERS

The 7th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2012) Held in conjunction with COMPSAC, the IEEE Signature Conference on Computers, Software, and Applications

Website:
http://compsac.cs.iastate.edu/workshop_details.php?id=47&y

July 16-20, 2012
Izmir, Turkey


This workshop will bring together researchers from both academia and industry to discuss methods and tools to achieve security, trust, and privacy (STP) goals of both traditional and emerging Web-based software applications. The workshop will focus on techniques, experiences and lessons learned with respect to the STP aspects of software specification, design, implementation, testing, and deployment.


Our societies are increasingly dependent on software applications. Software applications must be engineered with reliable protection mechanisms with respect to security, privacy, and trust (STP), while still delivering the expected value of applications to end-users. Nonetheless, the scale and severity of security attacks on software applications have continued to grow at an ever-increasing pace. Potential consequences of a compromised software application have also become more and more serious as many high-profile attacks are reportedly targeting software applications used in industrial control systems at nuclear power plants, in implanted heart defibrillators, and in military satellites. This situation has been worsened by recent technological developments, including pervasive computing, mobile devices, Web applications and cloud computing, which have made the untrusted Internet an integral component of software applications. The traditional approaches to securing a software application (e.g., anti-virus) alone are no longer sufficient to address the STP issues of such emerging software applications. The STP issues must be addressed throughout the lifecycle of a software application, including its design, implementation, testing, and deployment. The principal obstacle in developing STP-aware software is the lack of consideration, methods, and tools for addressing STP issues under current approaches to software applications development.


Topics of interest include, but are not limited to, the following:

* Security, trust, and privacy (STP) challenges and solutions in Web-based applications
* STP challenges and solutions in cloud-based applications
* STP challenges and solutions in pervasive software applications
* STP challenges and solutions in mobile software applications
* STP challenges and solutions in e-services, e.g. e-health, e-government, e-banking, etc.
* STP challenges and solutions in distributed or sensor-based software applications
* STP-Specific software development practices
* STP requirements elicitation and specification
* Models and languages for STP-aware software specification and design
* Architecture for STP-aware software development
* Testing STP properties of software applications
* STP management and usability issues in software applications
* User interfaces for STP-aware software applications
* Software reengineering for STP-aware software applications
* Tradeoffs among security, privacy, trust, and other criteria
* STP-aware service discovery mechanisms for pervasive computing environments
* Teaching STP-aware software development
* Experience reports on developing STP-aware software


IMPORTANT DATES

March 30, 2012: Workshop paper submission (deadline extended)
April 20, 2012: Workshop paper author notification
May 2, 2012: Camera-ready & author registration


SUBMISSION

Papers must be submitted electronically via the SPTPA 2012 Submission Page at http://myreview.cs.iastate.edu/STPSA2012/. Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers at http://www.computer.org/portal/web/cscps/submission. All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2012) by the IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings. Each accepted paper must be presented in person by an author.


WORKSHOP ORGANIZERS

Program Chair:

Dr. Lingyu Wang
Associate Professor
Concordia Institute for Information Systems Engineering
Concordia University
Montreal, Quebec, Canada H3G1M8
Email: wang@ciise.concordia.ca


Program Committee:

Sheikh Iqbal Ahamed, Marquette University, USA
Mourad Debbabi, Concordia University, Canada
Stephan Eidenbenz, Los Alamos National Laboratory, USA
Chunfu Jia, Nankai University, China
Ruixuan Li, Huazhong University of Science and Technology, China
Mattia Monga, Universita degli Studi di Milano, Milan, Italy
Makan Pourzandi, Ericsson Research, Canada
Kui Ren, Illinois Institute of Technology, USA
Hossain Shahriar, Queen's University, Canada
Keshou Wu, Xiamen University of Technology, China
George Yee, NRC Canada, Canada
Shunzhi Zhu, Xiamen University of Technology, China

GENERAL INQUIRIES

For updated information, please contact PC Chair: Lingyu Wang (wang@ciise.concordia.ca)
For COMPSAC'12, please visit http://compsac.cs.iastate.edu/

Related Resources

EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
ACNS 2023   21st International Conference on Applied Cryptography and Network Security
ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)
IEEE PriComp 2022   The 2022 IEEE International Conference on Privacy Computing
IoT special issue 2022   Call for papers on the Special Issue titled Sustainability Privacy-Preserving of IoT-Based Application in Smart Healthcare
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
ICISSP 2023   9th International Conference on Information Systems Security and Privacy
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)