posted by user: beckersk || 1490 views || tracked by 5 users: [display]

ESPRE 2016 : 3rd Evolving Security & Privacy Requirements Engineering Workshop

FacebookTwitterLinkedInGoogle

Link: http://espre2016.org
 
When Sep 12, 2016 - Sep 12, 2016
Where Beijing, China
Submission Deadline Jun 18, 2016
Notification Due Jul 8, 2016
Final Version Due Jul 24, 2016
Categories    security   privacy   requirements engineering
 

Call For Papers

CALL FOR PAPERS

3rd Evolving Security & Privacy Requirements Engineering Workshop:
co-located with 24th IEEE International Requirements Engineering Conference

http://espre2016.org

12 September - Beijing, China

* INTRODUCTION

When specifying a system, security and privacy needs to be addressed as early as possible. Unfortunately, many people find doing so difficult in the face of conflicting priorities. When these concerns are addressed, we discover how intrinsically difficult specifying security and privacy can be, and the blurred distinction between requirements and security and privacy concepts.

The Evolving Security and Privacy Requirements Engineering (ESPRE) Workshop will be a multi-disciplinary, one-day workshop that brings together practitioners and researchers interested in security and privacy requirements. ESPRE will probe the interfaces between Requirements Engineering and Security & Privacy, and take the first step in evolving security and privacy requirements engineering to meet a range of needs of stakeholders ranging from business analysts and security engineers, to technology entrepreneurs and privacy advocates.


* TOPICS

Topics addressed by ESPRE are those which will promote discussion about advancing Security & Privacy Requirements Engineering. These include, but are not excluded to:

- Adaptation of security and privacy requirements
- Consideration of legal compliance during security & privacy requirements engineering
- Evolution of security and privacy requirements
- Identification and management of all stakeholders (including attackers)
- Modelling multilateral stakeholder perspectives on security and privacy
- Modelling of domain knowledge for security and privacy requirements
- Modelling of trust and risk
- Ontologies for security and privacy requirements engineering
- Positive (and especially negative) lessons learned applying security and requirements engineering in practice
- Scalability of security requirements engineering approaches
- Security and privacy requirements engineering processes
- Security and privacy requirements elicitation and analysis
- Security requirements-based testing
- Teaching and training in security and privacy requirements engineering
- The role of security and privacy requirements engineering to support design innovation
- Use of requirements engineering to create security and privacy standard-compliant software
- Validation and verification of security and privacy requirements

* IMPORTANT DATES

Submission deadline: June 13th, 2016
Decisions to authors: July 8th, 2016
Camera ready papers due: July 24th, 2016
Workshop date: September 12th, 2016

* ORGANISING COMMITEE

Kristian Beckers (Technical University Munich, Germany)
Shamal Faily (Bournemouth University, UK)
Seok-Won Lee (Ajou University, South Korea)
Nancy Mead (Carnegie Mellon University, USA)

* PROGRAMME COMMITTEE

Raian Ali (Bournemouth University, UK)
Nalin Asanka Gamagedara Arachchilage (University of New South Wales Canberra, Australia)
Andrea Atzeni (Politecnico di Torino, Italy)
Dan Berry (University of Waterloo, Canada)
Stephan Faßbender (University of Duisburg-Essen, Germany)
Carmen Fernández Gago (University of Malaga, Spain)
Sepideh Ghanavati (Radboud Unversity, The Netherlands)
Martin Gilje Jaatun (SINTEF ICT, Norway)
Marit Hansen (Independent Centre for Privacy Protection Schleswig-Holstein, Germany)
Denis Hatebur (University of Duisburg-Essen, Germany)
Maritta Heisel (University of Duisburg-Essen, Germany)
Meiko Jensen (Independent Centre for Privacy Protection Schleswig-Holstein, Germany)
Christos Kalloniatis (University of the Aegean, Greece)
Anne Koziolek (Karlsruhe Institute of Technology, Germany)
Lin Liu (Tsinghua University, China)
Raimundas Matulevicius (University of Tartu, Estonia)
Haralambos Mouratidis (University of Brighton, UK)
Bashar Nuseibeh (The Open University & Lero, UK / Ireland)
Martín Ochoa (Singapore University of Technology and Design, Singapore)
Federica Paci (University of Southampton, UK)
Jaehong Park (University of Alabama in Huntsville, USA)
Aljosa Pasic (Atos Origin, Spain)
Riccardo Scandariato (Chalmers and Gothenburg University, Sweden)
Ketil Stølen (SINTEF ICT, Norway)
Nicola Zannone (Eindhoven University of Technology, The Netherlands)
Mohammad Zulkernine (Queen’s University, Canada)

Related Resources

IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IJISS 2016   International Journal of Information Security Science (IJISS)
Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
FGCS SI - CI for OSN 2016   Special issue on Recent research in Computational Intelligence paradigms into Security and Privacy for Online Social Networks (OSNs)
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
IJMSA 2016   International Journal of Modelling, Simulation and Applications
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
PETS-Fourth-Issue 2017   17th Privacy Enhancing Technologies Symposium