STPSA 2014 - 9th IEEE International Workshop on Security, Trust, and Privacy for Software Applications
Topics/Call fo Papers
This workshop will bring together researchers from both academia and industry to discuss methods and tools to achieve security, trust, and privacy (STP) goals of both traditional and emerging Web-based software applications. The workshop will focus on techniques, experiences, and lessons learned with respect to the STP aspects of software specification, design, implementation, testing, and deployment.
Theme and Scope of the Workshop
The Internet has become an indispensable global platform that glues together daily communication, sharing, trading, collaboration, and service delivery using software applications. This is a witness that our society is increasingly dependant on software applications. Internet users often store and manage critical information that can attract cyber-criminals who misuse web-based programs and the Internet to exploit vulnerabilities for illegitimate benefits (such as for underground economy, violating privacy, etc.). Malicious programs are taking an alarmingly significant share of web-based attacks to evade the Security, Privacy, and Trust (STP) of software applications, and hence end-users. As noted also in several security incidents, this situation has been amplified by recent technological developments such as cloud computing, pervasive computing, mobile devices, by making the distrusted Internet an integral component of software applications. As such, the traditional host-based approaches (e.g., antivirus, firewall) to securing a software application alone are no longer sufficient to address the STP issues of such emerging software applications. The STP issues must be addressed throughout the lifecycle of a software application, including its design, implementation, testing, and deployment. The principal challenge of existing approaches in developing STP-aware software is the lack of consideration, methods, and tools for addressing STP issues during the software development processes and runtime operations.
Topics of interest include, but are not limited to, the following:
? STP specific software development practices
? STP requirements elicitation and specification
? Models and languages for STP-aware software specification and design
? Architecture for STP-aware software development
? Testing STP properties of software applications
? Formal analysis of STP properties in emerging software applications
? Runtime monitoring of STP properties
? STP configuration, management and usability issues in software applications
? Security, trust, and privacy (STP) challenges and solutions in Web-based applications
? STP challenges and solutions in Cloud computing applications
? STP challenges and solutions in pervasive applications
? STP challenges and solutions in mobile applications
? STP challenges and solutions in e-services such as e-health, e-government, e-banking, etc...
? STP challenges and solutions in distributed or sensor-based software applications
? STP-aware service discovery mechanisms for pervasive computing environments
? Experience reports on developing STP-aware software
? Teaching STP-aware software development
This year, we also solicit papers that focus on systematization of knowledge with respect to STP. The goal of this call is to encourage work that evaluates, systematizes, and contextualizes existing practices and knowledge with respect to STP.
Theme and Scope of the Workshop
The Internet has become an indispensable global platform that glues together daily communication, sharing, trading, collaboration, and service delivery using software applications. This is a witness that our society is increasingly dependant on software applications. Internet users often store and manage critical information that can attract cyber-criminals who misuse web-based programs and the Internet to exploit vulnerabilities for illegitimate benefits (such as for underground economy, violating privacy, etc.). Malicious programs are taking an alarmingly significant share of web-based attacks to evade the Security, Privacy, and Trust (STP) of software applications, and hence end-users. As noted also in several security incidents, this situation has been amplified by recent technological developments such as cloud computing, pervasive computing, mobile devices, by making the distrusted Internet an integral component of software applications. As such, the traditional host-based approaches (e.g., antivirus, firewall) to securing a software application alone are no longer sufficient to address the STP issues of such emerging software applications. The STP issues must be addressed throughout the lifecycle of a software application, including its design, implementation, testing, and deployment. The principal challenge of existing approaches in developing STP-aware software is the lack of consideration, methods, and tools for addressing STP issues during the software development processes and runtime operations.
Topics of interest include, but are not limited to, the following:
? STP specific software development practices
? STP requirements elicitation and specification
? Models and languages for STP-aware software specification and design
? Architecture for STP-aware software development
? Testing STP properties of software applications
? Formal analysis of STP properties in emerging software applications
? Runtime monitoring of STP properties
? STP configuration, management and usability issues in software applications
? Security, trust, and privacy (STP) challenges and solutions in Web-based applications
? STP challenges and solutions in Cloud computing applications
? STP challenges and solutions in pervasive applications
? STP challenges and solutions in mobile applications
? STP challenges and solutions in e-services such as e-health, e-government, e-banking, etc...
? STP challenges and solutions in distributed or sensor-based software applications
? STP-aware service discovery mechanisms for pervasive computing environments
? Experience reports on developing STP-aware software
? Teaching STP-aware software development
This year, we also solicit papers that focus on systematization of knowledge with respect to STP. The goal of this call is to encourage work that evaluates, systematizes, and contextualizes existing practices and knowledge with respect to STP.
Other CFPs
- IEEE International Workshop on Big Data Management for the Internet of Things
- The 2014 Third ICT International Student Project Conference (ICT-ISPC2014)
- The Fourth IIEEJ International Workshop on Image Electronics and Visual Computing
- The Third Asian Conference on Information Systems
- 6th Asian Conference on Machine Learning
Last modified: 2014-01-10 00:04:11