2009-01-16

[Mycolleagues] CFP: 4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2009)

4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2009)

 

in conjunction with COMPSAC 2009

Seattle , USA, July 20 - July 24, 2009

 

http://conferences.computer.org/compsac/2009/workshops/STPSA2009.html

 

GOAL OF THE WORKSHOP

 

This workshop will bring researchers from academia and industry to discuss methods and tools to achieve security,

trust, and privacy goals of both pervasive and pervasive software applications. This workshop will focus on

techniques, experiences and lessons learned with respect to the state of art for the security, trust, and privacy

aspects of both pervasive and non-pervasive software applications along with some open issues.

 

 

THEME OF THE WORKSHOP

 

Information security has become a major concern for both pervasive and non-pervasive software applications.

Software systems must be engineered with reliable protection mechanisms with respect to security, privacy,

 and trust, while still delivering the expected value of the software to their customers. The traditional

 approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security,

trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware

software applications. The principal obstacle in developing STP-aware software is that current software

specification, design, implementation, and testing practices do not include adequate methods and tools

to achieve security, trust, and privacy goals.

 

As most systems now are Internet-based, the number of attackers is increased dramatically and threat

 scenarios have changed. Traditional security measures do not fit well for the software of pervasive

applications. Since location and contexts are key attributes of pervasive applications, the privacy

issues need to be handled in a novel manner than traditional software applications. The devices in

pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need

for new trust models for pervasive computing applications. In this workshop, we will also welcome

papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.

 

 

 

SCOPE OF THE WORKSHOP

 

Topics of interest include, but are not limited to, the following:

                - Security, trust, and privacy specific software development practices

 

                - Security, trust, and privacy requirements elicitation and specification

 

                - Models and languages for STP-aware software specification and design

 

                - Architecture for STP-aware software development

 

                - STP challenges for pervasive software applications

 

                - Testing security, trust, and privacy properties of both pervasive and non-pervasive software

 

                - STP management and usability issues in software applications

 

                - User interfaces for STP-aware pervasive and non pervasive software

 

                - Software reengineering for security, trust, and privacy for both pervasive and non pervasive applications

 

                - Tradeoffs among security, privacy, trust, and other criteria

 

                - STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce,

                 e-marketing and other web-based and pervasive applications

 

                - STP challenges in mobile software applications

 

                - STP issues in sensor based software applications

 

                - User interfaces for secure and privacy-aware pervasive computing applications

 

                - STP-aware service discovery mechanisms for pervasive computing environments

 

                - Models for ensuring security, trust, and privacy in pervasive software applications

 

                - STP issues for handheld device software applications

 

                - Teaching STP-aware software development

 

                - Experience reports on developing STP-aware software

 

IMPORTANT DATES

 

March 1, 2009                    deadline for paper submission

April 7, 2009                        notification of acceptance

April 30, 2009                     camera-ready due

 

 

 

 

SUBMISSION

 

Papers must be submitted electronically via the STPSA 2009 Submission Page (http://rs.cs.iastate.edu/COMPSAC2009Workshops/STPSA2009/).

The format of submitted papers should follow the guidelines for the IEEE conference proceedings. All papers

will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages),

 and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop

proceedings of the 33rd IEEE Computer Software and Applications Conference (COMPSAC 2009) by the IEEE CS Press.

 At least one of the authors of each accepted paper or fast abstract must register as a full participant of

the workshop to have the paper or fast abstract published in the proceedings.

 

 

WORKSHOP ORGANIZERS

 

Program Co-Chairs

 

Sheikh Iqbal Ahamed

Dept. of Math, Statistics, and Computer Science, Marquette University

Milwaukee, Wisconsin 53201, USA

Email: iq@mscs.mu.edu

Homepage:  www.mscs.mu.edu/~iq

 

Mohammad Zulkernine

School of Computing, Queens University Kingston, Ontario

Canada K7L 3N6

Email:  mzulker@cs.queensu.ca

Homepage: www.cs.queensu.ca/~mzulker

 

Program Committee

 

 

John Buford, Panasonic, USA

Weifeng Chen, California University of Pennsylvania, USA

Tadashi Dohi, Hiroshima University, Japan

Stephan Eidenbenz, Los Alamos National Laboratory, USA

Philip Fong, University of Regina, Canada

Vahid Garousi, University of Calgary, Canada

Raquel Hill, Indiana University, USA

Andreas Holzinger, University of Graz, Austria

Achilles Kameas, Hellenic Open University, Greece

Khaled M. Khan, Qatar University, Qatar

Antonio Mana, University of Malaga, Spain

Daniele Quercia, University College London, UK

Natalia Stakhanova, University of New Brunswick, Canada

Boris Taratine, Bell Canada

George Yee, NRC Canada

Lingyu Wang, Concordia University, Canada

Guanhua Yan, Los Alamos National Laboratory, USA

Wensheng Zhang, Iowa State University, USA

Issa Traroe University of Victoria, Canada

Mattia Monga, Università degli Studi di Milano, Milan, Italy

 

 

 

 

GENERAL INQUIRIES  

 

For updated information, please contact the Program Co-Chairs:

iq@mscs.mu.edu or mzulker@cs.queensu.ca

 

 

 



 

2 comments:

Automatic wealth said...

WealthAutomatically offers Hfdata, Hftoms, Stp Management, Stp Management Company, Best Stp Management Company, Top Stp Management Company. Check out our wesbite for more details.Server Hosting Contracts

Automatic wealth said...

STP management is one of the most essential and popular concepts in the application and study of marketing. The letters of STP stand for targeting, positioning and segmentation. The STP is the most popular fundamental concept in marketing access. Check out our website for more details;STP Management