posted by user: beckersk || 6348 views || tracked by 7 users: [display]

ESPRE 2016 : 3rd Evolving Security & Privacy Requirements Engineering Workshop

FacebookTwitterLinkedInGoogle

Link: http://espre2016.org
 
When Sep 12, 2016 - Sep 12, 2016
Where Beijing, China
Submission Deadline Jun 13, 2016
Notification Due Jul 8, 2016
Final Version Due Jul 24, 2016
Categories    security   privacy   requirements engineering
 

Call For Papers

CALL FOR PAPERS

3rd Evolving Security & Privacy Requirements Engineering Workshop:
co-located with 24th IEEE International Requirements Engineering Conference

http://espre2016.org

12 September - Beijing, China

* INTRODUCTION

When specifying a system, security and privacy needs to be addressed as early as possible. Unfortunately, many people find doing so difficult in the face of conflicting priorities. When these concerns are addressed, we discover how intrinsically difficult specifying security and privacy can be, and the blurred distinction between requirements and security and privacy concepts.

The Evolving Security and Privacy Requirements Engineering (ESPRE) Workshop will be a multi-disciplinary, one-day workshop that brings together practitioners and researchers interested in security and privacy requirements. ESPRE will probe the interfaces between Requirements Engineering and Security & Privacy, and take the first step in evolving security and privacy requirements engineering to meet a range of needs of stakeholders ranging from business analysts and security engineers, to technology entrepreneurs and privacy advocates.


* TOPICS

Topics addressed by ESPRE are those which will promote discussion about advancing Security & Privacy Requirements Engineering. These include, but are not excluded to:

- Adaptation of security and privacy requirements
- Consideration of legal compliance during security & privacy requirements engineering
- Evolution of security and privacy requirements
- Identification and management of all stakeholders (including attackers)
- Modelling multilateral stakeholder perspectives on security and privacy
- Modelling of domain knowledge for security and privacy requirements
- Modelling of trust and risk
- Ontologies for security and privacy requirements engineering
- Positive (and especially negative) lessons learned applying security and requirements engineering in practice
- Scalability of security requirements engineering approaches
- Security and privacy requirements engineering processes
- Security and privacy requirements elicitation and analysis
- Security requirements-based testing
- Teaching and training in security and privacy requirements engineering
- The role of security and privacy requirements engineering to support design innovation
- Use of requirements engineering to create security and privacy standard-compliant software
- Validation and verification of security and privacy requirements

* IMPORTANT DATES

Submission deadline: June 13th, 2016
Decisions to authors: July 8th, 2016
Camera ready papers due: July 24th, 2016
Workshop date: September 12th, 2016

* ORGANISING COMMITEE

Kristian Beckers (Technical University Munich, Germany)
Shamal Faily (Bournemouth University, UK)
Seok-Won Lee (Ajou University, South Korea)
Nancy Mead (Carnegie Mellon University, USA)

* PROGRAMME COMMITTEE

Raian Ali (Bournemouth University, UK)
Nalin Asanka Gamagedara Arachchilage (University of New South Wales Canberra, Australia)
Andrea Atzeni (Politecnico di Torino, Italy)
Dan Berry (University of Waterloo, Canada)
Stephan Faßbender (University of Duisburg-Essen, Germany)
Carmen Fernández Gago (University of Malaga, Spain)
Sepideh Ghanavati (Radboud Unversity, The Netherlands)
Martin Gilje Jaatun (SINTEF ICT, Norway)
Marit Hansen (Independent Centre for Privacy Protection Schleswig-Holstein, Germany)
Denis Hatebur (University of Duisburg-Essen, Germany)
Maritta Heisel (University of Duisburg-Essen, Germany)
Meiko Jensen (Independent Centre for Privacy Protection Schleswig-Holstein, Germany)
Christos Kalloniatis (University of the Aegean, Greece)
Anne Koziolek (Karlsruhe Institute of Technology, Germany)
Lin Liu (Tsinghua University, China)
Raimundas Matulevicius (University of Tartu, Estonia)
Haralambos Mouratidis (University of Brighton, UK)
Bashar Nuseibeh (The Open University & Lero, UK / Ireland)
Martín Ochoa (Singapore University of Technology and Design, Singapore)
Federica Paci (University of Southampton, UK)
Jaehong Park (University of Alabama in Huntsville, USA)
Aljosa Pasic (Atos Origin, Spain)
Riccardo Scandariato (Chalmers and Gothenburg University, Sweden)
Ketil Stølen (SINTEF ICT, Norway)
Nicola Zannone (Eindhoven University of Technology, The Netherlands)
Mohammad Zulkernine (Queen’s University, Canada)

Related Resources

doors 2023   3rd Edge Computing Workshop
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
FPS 2022   The 15th International Symposium on Foundations & Practice of Security
BIOS 2022   8th International Conference on Bioinformatics & Biosciences
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
ACNS 2023   21st International Conference on Applied Cryptography and Network Security
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
IJANS 2022   International Journal on AdHoc Networking Systems