posted by user: mbn || 2602 views || tracked by 5 users: [display]

SPattern 2009 : 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09)

FacebookTwitterLinkedInGoogle


Conference Series : Secure Systems Methodologies Using Patterns
 
Link: http://www-ifs.uni-regensburg.de/spattern09/
 
When Aug 31, 2009 - Sep 4, 2009
Where Linz, Austria
Submission Deadline Mar 20, 2009
Final Version Due Mar 29, 2009
Categories    security patterns   design patterns   software engineering
 

Call For Papers

[Apologies for multiple copies of this announcement]


CALL FOR PAPERS

***********************************************************************
3rd International Workshop on Secure systems methodologies
using patterns (SPattern'09)

in conjunction with the
6 th International Conference on
Trust, Privacy & Security in Digital Business (TrustBus'09)

20th International Conference on Database
and Expert Systems Applications (DEXA 2009)

Linz, Austria, August 31 - September 04, 2009


http://www-ifs.uni-regensburg.de/spattern09/
***********************************************************************

****************************
GOALS AND TOPICS OF INTEREST
****************************

Security patterns have arrived to a stage where there are a significant
number of them, two books about them have been published, and industry
is starting to accept and use them. Analysis and design patterns have
been around for about ten years and have found practical use in many
projects. They have been incorporated into several software development
methodologies where less experienced developers can use them to receive
the advice and knowledge of experts. The situation is not so clear for
security patterns because no accepted methodology exists for their use.

Catalogs of security patterns are a good step, but they are not enough.
Building secure systems is a difficult process where security aspects are
interlaced with the satisfaction of functional requirements. Developers
are typically experts on a language or a development methodology but know
little about security, which results in them not knowing what security
mechanisms make sense at which moments. We need methodologies that guide
a designer at each stage of the development cycle. A few of them have
appeared, but none of them has been tested in production applications.

This workshop focuses on secure software methodologies. We seek papers
describing individual security patterns, new methodologies, new aspects
of existing methodologies, pattern languages to use in the methodologies,
reference architectures, blueprints, and related aspects. Experiences in
applying the methodologies to real situations are especially welcome.

******************
SUBMISSION DETAILS
******************

Authors are invited to submit research contributions, practical
experience reports and demos.
Papers must be original not previously published nor submitted in
parallel for publication to any other conference, workshop or journal.
Submissions must be in pdf and consist of no more than 5 pages in IEEE
double column format.

Accepted papers will be included in the DEXA workshop proceedings, to
be published by IEEE and available at the conference site. Final versions
of the papers must comply with "Authors Instructions" which are
accessible at: www.computer.org/portal/site/cscps/index.jsp

You are invited to submit your paper via DEXA'09 ConfDriver at:
http://confdriver.ifs.tuwien.ac.at/. For further inquiries, please contact
either of the program committee chairs. The conference organization office
can be reached at office@dexa.org.

At least one author of each accepted paper is required to attend the
conference and present the paper. Her/his registration fee must be paid
before May 31, 2009.

Important dates:
Submission of abstract March, 13th
Submission of full paper March, 20th
Notification to authors May, 8th
Final version due May, 29th

*****************
PROGRAM COMMITTEE
*****************

Workshop chairs
Eduardo B. Fernandez Florida Atlantic University (USA)
Günther Pernul University of Regensburg (Germany)

Program Committee
Fernandez-Medina, Eduardo Universidad de Castilla-La Mancha (Spain)
Heath, Craig Symbian (UK)
Jürjens, Jan The Open University (UK)
Lambrinoudakis, Kostas University of the Aegean (Greece)
Maña, Antonio University of Malaga (Spain)
Mouratidis, Haralambos University of East London (UK)
Ray, Indrakshi Colorado State University (USA)
Schumacher, Markus Virtual Forge GmbH & Fraunhofer SIT (Germany)
Sommerlad, Peter HSR Hochschule für Technik Rapperswil (Switzerland)
Thomsen, Dan Cyber Defense Agency (USA)
VanHilst, Michael Florida Atlantic University (USA)
Washizaki, Hironori National Institute of Informatics, Tokyo (Japan)
Yoder, Joe The Refactory, Inc. (USA)
Yoshioka, Nobukazu National Institute of Informatics, Tokyo (Japan)

*******
CONTACT
*******

Questions concerning the Call for Papers or submissions should be send
by E-Mail to: guenther.pernul@wiwi.uni-regensburg.de or ed@cse.fau.edu

Questions concerning the organization of the conference should be send
by E-Mail to: office@dexa.org

Prof. Dr. Eduardo B. Fernandez
Professor of Computer Science & Engineering
Department of Computer Science and Engineering
Florida Atlantic University
777 Glades Road
Boca Raton, FL 33431 - USA
ed@cse.fau.edu

Prof. Dr. Günther Pernul
Department of Information Systems
Universitätstr. 31
D-93053 Regensburg
Germany
guenther.pernul@wiwi.uni-regensburg.de

Related Resources

ACM BSCI 2024   The 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
PCDS 2024   The 1st International Symposium on Parallel Computing and Distributed Systems
MLANN 2024   2024 2nd Asia Conference on Machine Learning, Algorithms and Neural Networks (MLANN 2024)
ICoIV 2024   2024 International Conference on Intelligent Vehicles (ICoIV 2024)
ACM ICMLT 2024   ACM--2024 9th International Conference on Machine Learning Technologies (ICMLT 2024)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
ACM ICCTA 2024   ACM--2024 10th International Conference on Computer Technology Applications (ICCTA 2024)
ADMIT 2024   2024 3rd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2024)
COMSCI 2024   3rd International Conference on Computer Science and Information Technology