posted by system || 1389 views || tracked by 4 users: [display]

STPSA 2009 : 4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications

FacebookTwitterLinkedInGoogle

Link: http://conferences.computer.org/compsac/2009/workshops/STPSA2009.html
 
When Jul 20, 2009 - Jul 24, 2009
Where Seattle, Washington, USA
Submission Deadline Mar 1, 2009
Notification Due Apr 7, 2009
Final Version Due Apr 30, 2009
Categories    software
 

Call For Papers

4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2009)


in conjunction with COMPSAC 2009
Seattle , USA, July 20 - July 24, 2009

http://conferences.computer.org/compsac/2009/workshops/STPSA2009.html

GOAL OF THE WORKSHOP

This workshop will bring researchers from academia and industry to discuss methods and tools to achieve security,
trust, and privacy goals of both pervasive and pervasive software applications. This workshop will focus on
techniques, experiences and lessons learned with respect to the state of art for the security, trust, and privacy
aspects of both pervasive and non-pervasive software applications along with some open issues.


THEME OF THE WORKSHOP

Information security has become a major concern for both pervasive and non-pervasive software applications.
Software systems must be engineered with reliable protection mechanisms with respect to security, privacy,
and trust, while still delivering the expected value of the software to their customers. The traditional
approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security,
trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware
software applications. The principal obstacle in developing STP-aware software is that current software
specification, design, implementation, and testing practices do not include adequate methods and tools
to achieve security, trust, and privacy goals.

As most systems now are Internet-based, the number of attackers is increased dramatically and threat
scenarios have changed. Traditional security measures do not fit well for the software of pervasive
applications. Since location and contexts are key attributes of pervasive applications, the privacy
issues need to be handled in a novel manner than traditional software applications. The devices in
pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need
for new trust models for pervasive computing applications. In this workshop, we will also welcome
papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.



SCOPE OF THE WORKSHOP

Topics of interest include, but are not limited to, the following:
- Security, trust, and privacy specific software development practices

- Security, trust, and privacy requirements elicitation and specification

- Models and languages for STP-aware software specification and design

- Architecture for STP-aware software development

- STP challenges for pervasive software applications

- Testing security, trust, and privacy properties of both pervasive and non-pervasive software

- STP management and usability issues in software applications

- User interfaces for STP-aware pervasive and non pervasive software

- Software reengineering for security, trust, and privacy for both pervasive and non pervasive applications

- Tradeoffs among security, privacy, trust, and other criteria

- STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce,
e-marketing and other web-based and pervasive applications

- STP challenges in mobile software applications

- STP issues in sensor based software applications

- User interfaces for secure and privacy-aware pervasive computing applications

- STP-aware service discovery mechanisms for pervasive computing environments

- Models for ensuring security, trust, and privacy in pervasive software applications

- STP issues for handheld device software applications

- Teaching STP-aware software development

- Experience reports on developing STP-aware software

IMPORTANT DATES

March 1, 2009 deadline for paper submission
April 7, 2009 notification of acceptance
April 30, 2009 camera-ready due




SUBMISSION

Papers must be submitted electronically via the STPSA 2009 Submission Page (http://rs.cs.iastate.edu/COMPSAC2009Workshops/STPSA2009/).
The format of submitted papers should follow the guidelines for the IEEE conference proceedings. All papers
will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages),
and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop
proceedings of the 33rd IEEE Computer Software and Applications Conference (COMPSAC 2009) by the IEEE CS Press.
At least one of the authors of each accepted paper or fast abstract must register as a full participant of
the workshop to have the paper or fast abstract published in the proceedings.


WORKSHOP ORGANIZERS

Program Co-Chairs

Sheikh Iqbal Ahamed
Dept. of Math, Statistics, and Computer Science, Marquette University
Milwaukee, Wisconsin 53201, USA
Email: iq@mscs.mu.edu
Homepage: www.mscs.mu.edu/~iq

Mohammad Zulkernine
School of Computing, Queens University Kingston, Ontario
Canada K7L 3N6
Email: mzulker@cs.queensu.ca
Homepage: www.cs.queensu.ca/~mzulker

Program Committee


John Buford, Panasonic, USA
Weifeng Chen, California University of Pennsylvania, USA
Tadashi Dohi, Hiroshima University, Japan
Stephan Eidenbenz, Los Alamos National Laboratory, USA
Philip Fong, University of Regina, Canada
Vahid Garousi, University of Calgary, Canada
Raquel Hill, Indiana University, USA
Andreas Holzinger, University of Graz, Austria
Achilles Kameas, Hellenic Open University, Greece
Khaled M. Khan, Qatar University, Qatar
Antonio Mana, University of Malaga, Spain
Daniele Quercia, University College London, UK
Natalia Stakhanova, University of New Brunswick, Canada
Boris Taratine, Bell Canada
George Yee, NRC Canada
Lingyu Wang, Concordia University, Canada
Guanhua Yan, Los Alamos National Laboratory, USA
Wensheng Zhang, Iowa State University, USA
Issa Traroe University of Victoria, Canada
Mattia Monga, Universit? degli Studi di Milano, Milan, Italy




GENERAL INQUIRIES

For updated information, please contact the Program Co-Chairs:
iq@mscs.mu.edu or mzulker@cs.queensu.ca

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SOFT 2024   10th International Conference on Software Engineering
S&P 2025   The 45th IEEE Symposium on Security and Privacy
SOFT 2024   10th International Conference on Software Engineering
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
IJAIT 2024   International Journal of Advanced Information Technology
ICAASE 2024   The 6th Edition of the International Conference on Advanced Aspectsof Software Engineering
SOENG 2024   10th International Conference on Software Engineering
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex