STAM 2015 - First International Workshop on Security Testing And Monitoring ? topic: Secure Interoperability
Topics/Call fo Papers
Computer networked systems and services have become a crucial infrastructure element for the organization of modern society. These networks and services are required to be more and more open and new technology is designed to facilitate the interoperation between these networks composed of heterogeneous, communicating devices. Guaranteeing that they interoperate securely has become a major concern for individuals, enterprises and governments. In this framework paradigms such as cloud computing offer many benefits, however, security issues such as confidentiality and privacy are still major concerns to those intending to migrate to the cloud. Since the environment may be potentially hostile and contain malicious opponents, it is crucial to define frameworks to enforce secure interoperability. By secure interoperability we mean the property that two or more entities need to possess in order to communicate or exchange information even though they have different security policies. The workshop tries to answer to the issue of how models and techniques can help users to insure secure interoperability between heterogeneous systems. At the same time, the workshop tries to understand how to solve the challenging secure interoperability issue given that checking the secure of a system alone is already a fundamentally critical task, by providing new models and techniques to insure interoperability such as testing, formal models, and monitoring techniques. The objective of this workshop is to share ideas, methods, techniques, and tools about secure interoperability to improve the state of the art. In addition to scientific paper presentations, we intend to have one or two keynotes describing ongoing activities in the related areas and demonstrations of some innovative security testing tools.
Supporting projects
STAM workshop is upported by projects: FP7-Inter-Trust, H2020-MUSA, H2020-CLARUS, Rapid-ISER/INTERSEC, and ANR-DOCTOR.
Topics of interest comprise but are not limited to:
The goal of STAM workshop is to bring together security practitioners and researchers to exchange ideas, perspectives on problems, and solutions. Papers proposing novel models, methods, and algorithms are welcomed as well as papers reporting experiences on the application of existing methods on case studies and industrial examples, and research project success stories.
Secure interoperability for multi-cloud systems
Secure multi-cloud collaboration
Formals models for secure interoperability
Access control policies for secure interoperability
Security interoperability requirements definition and modelling
Runtime monitoring of secure interoperability of relevant applications
Ontologies for secure interoperability
Techniques to validate secure interoperability
Comparisons between security-by-design and formal approaches
Testing techniques for secure interoperability
Secure interoperability testing Automation Regression testing for security interoperability
Robustness and fault tolerance to attacks
Test-driven diagnosis of security interoperability weaknesses
Fuzz testing for secure interoperability
Application of mutation techniques to security interoperability
Trust and privacy in secure interoperability
Secure interoperability in Cloud-based environments
Security testing & monitoring in multi-cloud environments
Tools for security interoperability
Industrial experience reports
Project success stories
Supporting projects
STAM workshop is upported by projects: FP7-Inter-Trust, H2020-MUSA, H2020-CLARUS, Rapid-ISER/INTERSEC, and ANR-DOCTOR.
Topics of interest comprise but are not limited to:
The goal of STAM workshop is to bring together security practitioners and researchers to exchange ideas, perspectives on problems, and solutions. Papers proposing novel models, methods, and algorithms are welcomed as well as papers reporting experiences on the application of existing methods on case studies and industrial examples, and research project success stories.
Secure interoperability for multi-cloud systems
Secure multi-cloud collaboration
Formals models for secure interoperability
Access control policies for secure interoperability
Security interoperability requirements definition and modelling
Runtime monitoring of secure interoperability of relevant applications
Ontologies for secure interoperability
Techniques to validate secure interoperability
Comparisons between security-by-design and formal approaches
Testing techniques for secure interoperability
Secure interoperability testing Automation Regression testing for security interoperability
Robustness and fault tolerance to attacks
Test-driven diagnosis of security interoperability weaknesses
Fuzz testing for secure interoperability
Application of mutation techniques to security interoperability
Trust and privacy in secure interoperability
Secure interoperability in Cloud-based environments
Security testing & monitoring in multi-cloud environments
Tools for security interoperability
Industrial experience reports
Project success stories
Other CFPs
- Twelfth International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics
- Second International Workshop on Graphical Models for Security
- International Conference on on Product-Focused Software Process Improvement
- Do-it-yourself Networking: an Interdisciplinary Approach
- Workshop on IoT challenges in Mobile and Industrial Systems (IoT-Sys 2015)
Last modified: 2015-02-07 23:15:41