posted by user: STAM2016 || 2274 views || tracked by 3 users: [display]

STAM 2016 : Second IEEE International Workshop on Security Testing and Monitoring

FacebookTwitterLinkedInGoogle

Link: http://www.montimage.com/STAM2016
 
When Jun 27, 2016 - Jun 27, 2016
Where Nara, Japan
Submission Deadline Jan 31, 2016
Notification Due Mar 21, 2016
Final Version Due Apr 28, 2016
Categories    201   939   727
 

Call For Papers

The Second International IEEE Workshop on Security Testing and Monitoring in Distributed Systems
Workshop co-located with the IEEE ICDCS 2016 conference

http://www.montimage.com/STAM2016

Submission Deadline: January 31st, 2016
Author Notification: March 21st, 2016
Camera-Ready Due: April 28th, 2016


About STAM:
Distributed computer networked systems and services have become a crucial infrastructure element for the organization of modern society. These networks and services are required to be more and more open and new technology is designed to facilitate the inter-operation between these networks composed of heterogeneous, communicating devices. Since the environment may be potentially hostile and contain malicious components, it is crucial to define frameworks adapted to distributed systems to enforce security and privacy.
The STAM workshop tries to answer how vulnerability, intrusions and attacks modeling can help users understand the occurrence of malicious behaviors in order to avoid them, and what are the advantages and drawbacks of the existing models. At the same time, the workshop tries to understand how to solve the challenging security testing and monitoring problem given that testing distributed systems is a complex task and security will add new challenges and difficulties to be solved.  

Topics of Interest:
Security testing in distributed systems
Security testing in distributed systems
Security monitoring in distributed systems
Testing techniques in distributed systems: Fuzz, regression, mutation, safety and robustness etc.
Formals models for security in distributed systems
Security requirements definition and modeling
Security testing and monitoring automation
Attacks tolerance in distributed environments
Remediation and reactions against attacks in distributed systems
Security testing and monitoring for cloud and multi-cloud systems
Security testing and monitoring for IoT
Security testing and monitoring for big data
Security testing and monitoring for critical infrastructure
Trust and privacy in distributed environments
Tools for security testing and monitoring
Industrial experience reports

General Chairs :
Ana Rosa Cavalli (Montimage/Telecom SudParis)
Wissam Mallouli (Montimage, France)

Paper Selection Procedure:
Full papers (6 pages) and short papers (2 pages) are requested in IEEE two-column format. Also, demonstrations of security testing tools (4 pages) and project success stories are solicited. Each paper will be reviewed by at least 3 program committee members. Easychair platform is used for the submission and review process.
The STAM workshop proceedings are expected to be published in the IEEE ICDCS Proceedings.

Related Resources

S&P 2025   The 45th IEEE Symposium on Security and Privacy
PRDC 2024   29th IEEE Pacific Rim International Conference on Dependable Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
IEEE BigData 2024   2024 IEEE International Conference on Big Data
ISSTA 2024   The ACM SIGSOFT International Symposium on Software Testing and Analysis (Round 1)
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2