STPSA 2015 - 10th IEEE International Workshop on Security, Trust, and Privacy for Software Applications
Topics/Call fo Papers
STPSA will bring together researchers from both academia and industry to discuss methods and tools to achieve security, trust, and privacy (STP) goals of both traditional and emerging web-based and mobile software applications. The workshop will focus on techniques, experiences and lessons learned with respect to the STP aspects of software and mobile application specification, design, implementation, testing, and deployment.
Our societies are becoming increasingly dependent on software applications. Software applications must be engineered with reliable protection mechanisms with respect to security, privacy, and trust (STP), while still delivering the expected value of applications to end-users. Nonetheless, the scale and severity of security attacks on different types of software applications, from web-based to mobile services, have continued to grow at an ever-increasing pace. Potential consequences of a compromised software applications have also become more and more serious as many high-profile attacks are reportedly targeting software applications used in industrial control systems at nuclear power plants, in implanted heart defibrillators, and in military satellites. This situation has been worsened by recent technological developments, including pervasive computing, mobile devices, web applications and cloud computing, which have made the distrusted Internet an integral component of software applications. The traditional approaches to securing a software application (e.g., anti-virus) alone are no longer sufficient to address the STP issues of such emerging software applications. The STP issues must be addressed throughout the lifecycle of a software application, including its design, implementation, testing, and deployment. The principal obstacle in developing STP-aware software is the lack of consideration, methods, and tools for addressing STP issues under current approaches to software applications development.
Topics of interest include, but are not limited to, the following:
Security, trust, and privacy (STP) challenges and solutions in Web-based applications
Security, trust, and privacy (STP) challenges and solutions in mobile applications
STP challenges and solutions in cloud computing applications
STP challenges and solutions in pervasive software applications
STP challenges and solutions in mobile software applications
STP challenges and solutions in e-services, e.g. e-health, e-government, e-banking, etc.
STP challenges and solutions in distributed or sensor-based software applications
STP specific software development practices
STP requirements elicitation and specification
Models and languages for STP-aware software specification and design
Architecture for STP-aware software development
Testing STP properties of software applications
Testing STP properties of web based applications
STP management and usability issues in software applications
User interfaces for STP-aware software applications
Software reengineering for STP-aware software applications
Tradeoffs among security, privacy, trust, and other criteria
STP-aware service discovery mechanisms for pervasive computing environments
Teaching STP-aware software development
Experience reports on developing STP-aware software
Our societies are becoming increasingly dependent on software applications. Software applications must be engineered with reliable protection mechanisms with respect to security, privacy, and trust (STP), while still delivering the expected value of applications to end-users. Nonetheless, the scale and severity of security attacks on different types of software applications, from web-based to mobile services, have continued to grow at an ever-increasing pace. Potential consequences of a compromised software applications have also become more and more serious as many high-profile attacks are reportedly targeting software applications used in industrial control systems at nuclear power plants, in implanted heart defibrillators, and in military satellites. This situation has been worsened by recent technological developments, including pervasive computing, mobile devices, web applications and cloud computing, which have made the distrusted Internet an integral component of software applications. The traditional approaches to securing a software application (e.g., anti-virus) alone are no longer sufficient to address the STP issues of such emerging software applications. The STP issues must be addressed throughout the lifecycle of a software application, including its design, implementation, testing, and deployment. The principal obstacle in developing STP-aware software is the lack of consideration, methods, and tools for addressing STP issues under current approaches to software applications development.
Topics of interest include, but are not limited to, the following:
Security, trust, and privacy (STP) challenges and solutions in Web-based applications
Security, trust, and privacy (STP) challenges and solutions in mobile applications
STP challenges and solutions in cloud computing applications
STP challenges and solutions in pervasive software applications
STP challenges and solutions in mobile software applications
STP challenges and solutions in e-services, e.g. e-health, e-government, e-banking, etc.
STP challenges and solutions in distributed or sensor-based software applications
STP specific software development practices
STP requirements elicitation and specification
Models and languages for STP-aware software specification and design
Architecture for STP-aware software development
Testing STP properties of software applications
Testing STP properties of web based applications
STP management and usability issues in software applications
User interfaces for STP-aware software applications
Software reengineering for STP-aware software applications
Tradeoffs among security, privacy, trust, and other criteria
STP-aware service discovery mechanisms for pervasive computing environments
Teaching STP-aware software development
Experience reports on developing STP-aware software
Other CFPs
- 8th IEEE International Workshop on Service Science and Systems
- 1st IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking
- 7th IEEE International Workshop on Computer Forensics in Software Engineering
- 7th IEEE International Workshop on Security Aspects of Process and Services Engineering
- 9th IEEE International Workshop on Quality Oriented Reuse of Software
Last modified: 2015-01-17 15:33:14