STPSA 2017 - 12th IEEE International COMPSAC Workshop on Security, Trust and Privacy for Software Applications
Topics/Call fo Papers
This workshop will bring researchers from academia and industry to discuss methods and tools to achieve security, trust, and privacy goals of both pervasive and pervasive software applications. This workshop will focus on techniques, experiences and lessons learned with respect to the state of art for the security, trust, and privacy aspects of both pervasive and non-pervasive software applications along with some open issues.
Theme of the Workshop:
Information security has become a major concern for both pervasive and non-pervasive software applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools to achieve security, trust, and privacy goals.
As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.
Scope of the Workshop:
Topics of interest include, but are not limited to, the following:
Security, trust, and privacy specific software development practices
Security, trust, and privacy requirements elicitation and specification
Models and languages for STP-aware software specification and design
Architecture for STP-aware software development
STP challenges for pervasive software applications
Testing security, trust, and privacy properties of both pervasive and non-pervasive software
STP management and usability issues in software applications
User interfaces for STP-aware pervasive and non pervasive software
Software reengineering for security, trust, and privacy for both pervasive and non pervasive applications
Tradeoffs among security, privacy, trust, and other criteria
STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce, e-marketing and other web-based and pervasive applications
STP challenges in mobile software applications
STP issues in sensor based software applications
User interfaces for secure and privacy-aware pervasive computing applications
STP-aware service discovery mechanisms for pervasive computing environments
Models for ensuring security, trust, and privacy in pervasive software applications
STP issues for handheld device software applications such as healthcare
Teaching STP-aware software development
Experience reports on developing STP-aware software
Program Committee (tentative):
Umesh Bellur, IIT Bombay, India
John Buford, Panasonic, USA
Ying Cai, Iowa State University, USA
Tadashi Dohi, Hiroshima University, Japan
Philip Fong, University of Regina, Canada
Vahid Garousi, University of Calgary, Canada
Neelam Gupta, University of Arizona, USA
Christian Hauser, University of Stuttgart, Germany
Raquel L. Hill, Indiana University, USA
Andreas Holzinger, University of Graz, Austria
Patrick Hung, Univ. of Ontario Inst. of Tech., Canada
Min-Shiang Hwang. National Chung Hsing Univ., Taiwan
Anwar Haque, Bell Canada, Hamilton, Canada
Tom Karygiannis, NIST, USA
Achilles Kameas, Hellenic Open University, Greece
Mujtaba Khambatti, Microsoft Corporation, USA
Zakaria Maamar, Zayed University, UAE
Kiran Mudiam, Motorola Corporation, USA
Jalal Al-Muhtadi, King Saud University, Saudi Arabia
Nanjangud Narendra, IBM Corporation , India
George Roussos, University of London, UK
Mukesh Singhal, University of Kentucky, USA
Issa Traore, University of Victoria, Canada
Miroslav Velev, Consultant, USA
George Yee, NRC Canada
Wang Yu, Auburn University, USA
Lingyu Wang, Concordia University, Canada
Stephen Weis, MIT, USA
Wensheng Zhang. Iowa State University, USA
Theme of the Workshop:
Information security has become a major concern for both pervasive and non-pervasive software applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools to achieve security, trust, and privacy goals.
As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.
Scope of the Workshop:
Topics of interest include, but are not limited to, the following:
Security, trust, and privacy specific software development practices
Security, trust, and privacy requirements elicitation and specification
Models and languages for STP-aware software specification and design
Architecture for STP-aware software development
STP challenges for pervasive software applications
Testing security, trust, and privacy properties of both pervasive and non-pervasive software
STP management and usability issues in software applications
User interfaces for STP-aware pervasive and non pervasive software
Software reengineering for security, trust, and privacy for both pervasive and non pervasive applications
Tradeoffs among security, privacy, trust, and other criteria
STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce, e-marketing and other web-based and pervasive applications
STP challenges in mobile software applications
STP issues in sensor based software applications
User interfaces for secure and privacy-aware pervasive computing applications
STP-aware service discovery mechanisms for pervasive computing environments
Models for ensuring security, trust, and privacy in pervasive software applications
STP issues for handheld device software applications such as healthcare
Teaching STP-aware software development
Experience reports on developing STP-aware software
Program Committee (tentative):
Umesh Bellur, IIT Bombay, India
John Buford, Panasonic, USA
Ying Cai, Iowa State University, USA
Tadashi Dohi, Hiroshima University, Japan
Philip Fong, University of Regina, Canada
Vahid Garousi, University of Calgary, Canada
Neelam Gupta, University of Arizona, USA
Christian Hauser, University of Stuttgart, Germany
Raquel L. Hill, Indiana University, USA
Andreas Holzinger, University of Graz, Austria
Patrick Hung, Univ. of Ontario Inst. of Tech., Canada
Min-Shiang Hwang. National Chung Hsing Univ., Taiwan
Anwar Haque, Bell Canada, Hamilton, Canada
Tom Karygiannis, NIST, USA
Achilles Kameas, Hellenic Open University, Greece
Mujtaba Khambatti, Microsoft Corporation, USA
Zakaria Maamar, Zayed University, UAE
Kiran Mudiam, Motorola Corporation, USA
Jalal Al-Muhtadi, King Saud University, Saudi Arabia
Nanjangud Narendra, IBM Corporation , India
George Roussos, University of London, UK
Mukesh Singhal, University of Kentucky, USA
Issa Traore, University of Victoria, Canada
Miroslav Velev, Consultant, USA
George Yee, NRC Canada
Wang Yu, Auburn University, USA
Lingyu Wang, Concordia University, Canada
Stephen Weis, MIT, USA
Wensheng Zhang. Iowa State University, USA
Other CFPs
- 4th IEEE International COMPSAC Workshop on User Centered Design and Adaptive Systems
- 12th IEEE International Workshop on E-Health Systems and Semantic Web
- 9th International Conference on Engineering, Science, Business and Management 2017
- Qualification of Clean Compressed Air Systems for cGMP Manufacturing
- W-9 DUE DILIGENCE LEADS TO ERROR FREE FORMS 1099
Last modified: 2017-03-20 23:05:10