posted by user: baliosian || 5388 views || tracked by 5 users: [display]

STAM 2015 : First International Workshop on Security Testing And Monitoring – topic: Secure Interoperability

FacebookTwitterLinkedInGoogle

Link: http://www.ares-conference.eu/conference/ares-eu-symposium/stam-2015/
 
When Aug 24, 2015 - Aug 28, 2015
Where Toulouse, France
Submission Deadline Apr 1, 2015
Notification Due May 11, 2015
Final Version Due Jun 8, 2015
Categories    security   monitoring   testing   interoperability
 

Call For Papers

STAM 2015: First International Workshop on Security Testing And Monitoring - topic: Secure Interoperability


to be held in conjunction with the 10th International Conference on Availability, Reliability and Security
(ARES 2015 – http://www.ares-conference.eu)
August 24-28, 2015
Université Paul Sabatier
Toulouse, France

Call for Papers
---------------

Computer networked systems and services have become a crucial infrastructure element for the organization of modern society. These networks and services are required to be more and more open and new technology is designed to facilitate the interoperation between these networks composed of heterogeneous, communicating devices. Guaranteeing that they interoperate securely has become a major concern for individuals, enterprises and governments. In this framework paradigms such as cloud computing offer many benefits, however, security issues such as confidentiality and privacy are still major concerns to those intending to migrate to the cloud. Since the environment may be potentially hostile and contain malicious opponents, it is crucial to define frameworks to enforce secure interoperability. By secure interoperability we mean the property that two or more entities need to possess in order to communicate or exchange information even though they have different security policies. The workshop tries to answer to the issue of how models and techniques can help users to insure secure interoperability between heterogeneous systems. At the same time, the workshop tries to understand how to solve the challenging secure interoperability issue given that checking the secure of a system alone is already a fundamentally critical task, by providing new models and techniques to insure interoperability such as testing, formal models, and monitoring techniques. The objective of this workshop is to share ideas, methods, techniques, and tools about secure interoperability to improve the state of the art. In addition to scientific paper presentations, we intend to have one or two keynotes describing ongoing activities in the related areas and demonstrations of some innovative security testing tools.

1 Topics of Interest

The goal of STAM workshop is to bring together security practitioners and researchers to exchange ideas, perspectives on problems, and solutions. Papers proposing novel models, methods, and algorithms are welcomed as well as papers reporting experiences on the application of existing methods on case studies and industrial examples, and research project success stories.

The topics of interest include but are not restricted to:

• Secure interoperability for multi-cloud systems.
• Secure multi-cloud collaboration.
• Formals models for secure interoperability.
• Access control policies for secure interoperability.
• Security interoperability requirements definition and modelling.
• Runtime monitoring of secure interoperability of relevant applications.
• Ontologies for secure interoperability.
• Techniques to validate secure interoperability.
• Comparisons between security-by-design and formal approaches.
• Testing techniques for secure interoperability.
• Secure interoperability testing automation.
• Regression testing for security interoperability.
• Robustness and fault tolerance to attacks.
• Test-driven diagnosis of security interoperability weaknesses.
• Fuzz testing for secure interoperability.
• Application of mutation techniques to security interoperability.
• Trust and privacy in secure interoperability.
• Secure interoperability in Cloud-based environments.
• Security testing & monitoring in multi-cloud environments.
• Tools for security interoperability.
• Industrial experience reports.
• Project success stories.

2 Important Dates

• Submission Deadline: April 1, 2015
• Author Notification: May 11, 2015
• Proceedings Version: June 8, 2015
• Conference: August 24-28, 2015

3 Workshop Chairs

• JAVIER BALIOSIAN
Universidad de la República, Uruguay
• ANA ROSA CAVALLI
Telecom SudParis, France
• WISSAM MALLOULI
Montimage, France

4 Supporting projects

STAM workshop is upported by projects: FP7-Inter-Trust, H2020-MUSA, H2020-CLARUS, Rapid-ISER/INTERSEC, and ANR-DOCTOR

5 Program Committee

• Jaime Arrazola (Indra Systems, Spain)
• Fabien Autrel (Telecom Bretagne, France)
• Gustavo Betarte (University of the Republic, Uruguay)
• Olivier Bettan (Thales, France)
• Valentina Casola, (CERICT, Italy)
• Thibault Cholez (INRIA, France)
• Frédéric Cuppens (Telecom Bretagne, France)
• Nora Cuppens-Boulabia (Telecom Bretagne, France)
• Crisam de los Santos, (SCYTL, Spain)
• Josep Domingo-Ferrer (Universitat Rovira i Virgili, Catalonia)
• Lidia Fuentes (Universidad de Malaga, Spain)
• Guillaume Doyen (UTT, Troyes, France)
• Sammy Haddad (Oppida, France)
• Stephane Maag (Telecom SudParis)
• Wissam Mallouli (Montimage, France)
• Bertrand Mathieu (Orange, France)
• Refik Molva (Eurécom, France)
• Edgardo Montes de Oca (Montimage, France)
• Enrico Morten (Softeco, Italy)
• Rita Pasini (Softeco, Italy)
• Erkuden Rios Velasco (Tecnalia, Spain)
• David Sánchez (URV, Catalonia)
• Patrick Senac (ISAE, Toulouse, France)
• Thomas Silverston (LORIA, France)
• Antonio Skarmeta (Universidad de Murcia, Spain)
• Daniel Thiemert (Reading University, UK)
• Khalifa Toumi (Télécom SudParis, France)
• Bachar Wehbi (Montimage, France)
• Fatiha Zaidi (Université de Paris Sud, France)

6 Submission

The proceedings of ARES (including workshops) will be published by Conference Publishing Services (CPS) of IEEE. The submission guidelines valid for the STAM workshop are the same as for the ARES conference. They can be found in http://www.ares-conference.eu/conference/conference/submission/

Related Resources

TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
AI 2017   3rd International Conference on Artificial Intelligence and Applications
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
VLSIA 2017   3rd International Conference on VLSI and Applications
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ISSTA 2018   International Symposium on Software Testing and Analysis
Recent Advances in Social Media 2017   Social Media: Recent Advances in Applications, Monitoring and Analytics