posted by user: kommy || 6143 views || tracked by 21 users: [display]

STPSA 2013 : The 8th IEEE International Workshop on Security, Trust and Privacy for Software Applications

FacebookTwitterLinkedInGoogle

Link: http://compsac.cs.iastate.edu/stpsa2013.php
 
When Jul 22, 2013 - Jul 26, 2013
Where Kyoto, Japan
Submission Deadline Apr 3, 2013
Notification Due Apr 26, 2013
Final Version Due May 5, 2013
Categories    security   computer science
 

Call For Papers

CALL FOR PAPERS

The 8th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2013) Held in conjunction with COMPSAC, the IEEE Signature Conference on Computers, Software, and Applications

Website:
http://compsac.cs.iastate.edu/workshop_details.php?id=47&y

July 22-26, 2013
Kyoto, Japan


This workshop will bring together researchers from both academia and industry to discuss methods and tools to achieve security, trust, and privacy (STP) goals of both traditional and emerging Web-based software applications. The workshop will focus on techniques, experiences, and lessons learned with respect to the STP aspects of software specification, design, implementation, testing, and deployment.

The Internet has become an indispensable global platform that glues together daily communication, sharing, trading, collaboration, and service delivery using software applications. This is a witness that our society is increasingly dependent on software applications. Internet users often store and manage critical information that can attract cyber-criminals who misuse web-based programs and the Internet to exploit vulnerabilities for illegitimate benefits (such as for underground economy, violating privacy, etc.). Malicious programs are taking an alarmingly significant share of web-based attacks to evade the Security, Privacy, and Trust (STP) of software applications, and hence end-users. As noted also in several security incidents, this situation has been amplified by recent technological developments such as cloud computing, pervasive computing, mobile devices, by making the distrusted Internet an integral component of software applications. As such, the traditional host-based approaches (e.g., antivirus, firewall) to securing a software application alone are no longer sufficient to address the STP issues of such emerging software applications. The STP issues must be addressed throughout the lifecycle of a software application, including its design, implementation, testing, and deployment. The principal challenge of existing approaches in developing STP-aware software is the lack of consideration, methods, and tools for addressing STP issues during the software development processes and runtime operations.

Topics of interest include, but are not limited to, the following:

* STP specific software development practices
* STP requirements elicitation and specification
* Models and languages for STP-aware software specification and design
* Architecture for STP-aware software development
* Testing STP properties of software applications
* Formal analysis of STP properties in emerging software applications
* Runtime monitoring of STP properties
* STP configuration, management and usability issues in software applications
* Security, trust, and privacy (STP) challenges and solutions in Web-based applications
* STP challenges and solutions in Cloud computing applications
* STP challenges and solutions in pervasive applications
* STP challenges and solutions in mobile applications
* STP challenges and solutions in e-services such as e-health, e-government, e-banking, etc
* STP challenges and solutions in distributed or sensor-based software applications
* STP-aware service discovery mechanisms for pervasive computing environments
* Experience reports on developing STP-aware software
* Teaching STP-aware software development



IMPORTANT DATES

March 20, 2013: Workshop paper submission
April 21, 2013: Workshop paper author notification
May 5, 2013: Camera-ready & author registration


SUBMISSION

Papers must be submitted electronically via the STPSA 2013 Submission Page once it becomes available. Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers: http://www.computer.org/portal/web/cscps/submission. All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2013) by the IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings. Each accepted paper must be presented in person by an author.

WORKSHOP ORGANIZERS

Program Chairs:

Lingyu Wang
Concordia Institute for Information Systems Engineering
Concordia University
Montreal, Quebec, Canada H3G1M8
Email: wang@ciise.concordia.ca

Komminist Weldemariam
School of Computing
Queen’s University
Kingston, Ontario, Canada
Email: weldemar@cs.queensu.ca


Program Committee:

Stephan Eidenbenz Los Alamos National Laboratory, USA
Chunfu Jia Nankai University, China
Mattia Monga Università degli Studi di Milano, Italy
Makan Pourzandi Ericson, Canada
Kui Ren Illinois Institute of Technology, USA 
Hossain Shahriar Kennesaw State University, USA
George Yee Carleton University, Canada
Lorenzo Cavallaro Royal Holloway, University of London, UK
Karthik Pattabiraman University of British Columbia, Canada
Mariano Ceccato Fondazione Bruno Kessler, Italy


GENERAL INQUIRIES

For updated information, please contact Lingyu Wang (wang (at) ciise.concordia.ca) or Komminist Weldemariam (weldemar (at) cs.queensu.ca)

Related Resources

IEEE--ICHST--Ei Compendex, Scopus 2020   IEEE--2020 2nd International Conference on Hardware Security and Trust (ICHST 2020)--Ei Compendex, Scopus
ICDMML 2020   【EI SCOPUS】2020 International Conference on Data Mining and Machine Learning
SP 2020   IEEE Symposium on Security and Privacy
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
ICHST--IEEE, Ei, Scopus 2020   IEEE--2020 2nd International Conference on Hardware Security and Trust (ICHST 2020)--Ei Compendex, Scopus
CVPR 2020   Computer Vision and Pattern Recognition
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
IEEE--ICISPP--Ei Compendex, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
ICISPP--IEEE, Ei, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G