SPattern 2009
Jump to navigation
Jump to search
| SPattern 2009 | |
|---|---|
3rd International Workshop on Secure systems methodologies using patterns (SPattern'09)
| |
| Dates | Aug 31, 2009 (iCal) - Sep 4, 2009 |
| Homepage: | www-ifs.uni-regensburg.de/spattern09/ |
| Location | |
| Location: | Linz, Austria |
| Important dates | |
| Submissions: | Mar 20, 2009 |
| Camera ready due: | Mar 29, 2009 |
| Table of Contents | |
[Apologies for multiple copies of this announcement]
CALL FOR PAPERS
***********************************************************************
3rd International Workshop on Secure systems methodologies
using patterns (SPattern'09)
in conjunction with the
6 th International Conference on
Trust, Privacy & Security in Digital Business (TrustBus'09)
20th International Conference on Database
and Expert Systems Applications (DEXA 2009)
Linz, Austria, August 31 - September 04, 2009
http://www-ifs.uni-regensburg.de/spattern09/
***********************************************************************
****************************
GOALS AND TOPICS OF INTEREST
****************************
Security patterns have arrived to a stage where there are a significant
number of them, two books about them have been published, and industry
is starting to accept and use them. Analysis and design patterns have
been around for about ten years and have found practical use in many
projects. They have been incorporated into several software development
methodologies where less experienced developers can use them to receive
the advice and knowledge of experts. The situation is not so clear for
security patterns because no accepted methodology exists for their use.
Catalogs of security patterns are a good step, but they are not enough.
Building secure systems is a difficult process where security aspects are
interlaced with the satisfaction of functional requirements. Developers
are typically experts on a language or a development methodology but know
little about security, which results in them not knowing what security
mechanisms make sense at which moments. We need methodologies that guide
a designer at each stage of the development cycle. A few of them have
appeared, but none of them has been tested in production applications.
This workshop focuses on secure software methodologies. We seek papers
describing individual security patterns, new methodologies, new aspects
of existing methodologies, pattern languages to use in the methodologies,
reference architectures, blueprints, and related aspects. Experiences in
applying the methodologies to real situations are especially welcome.
******************
SUBMISSION DETAILS
******************
Authors are invited to submit research contributions, practical
experience reports and demos.
Papers must be original not previously published nor submitted in
parallel for publication to any other conference, workshop or journal.
Submissions must be in pdf and consist of no more than 5 pages in IEEE
double column format.
Accepted papers will be included in the DEXA workshop proceedings, to
be published by IEEE and available at the conference site. Final versions
of the papers must comply with "Authors Instructions" which are
accessible at: www.computer.org/portal/site/cscps/index.jsp
You are invited to submit your paper via DEXA'09 ConfDriver at:
http://confdriver.ifs.tuwien.ac.at/. For further inquiries, please contact
either of the program committee chairs. The conference organization office
can be reached at office@dexa.org.
At least one author of each accepted paper is required to attend the
conference and present the paper. Her/his registration fee must be paid
before May 31, 2009.
Important dates:
Submission of abstract March, 13th
Submission of full paper March, 20th
Notification to authors May, 8th
Final version due May, 29th
*****************
PROGRAM COMMITTEE
*****************
Workshop chairs
Eduardo B. Fernandez Florida Atlantic University (USA)
Günther Pernul University of Regensburg (Germany)
Program Committee
Fernandez-Medina, Eduardo Universidad de Castilla-La Mancha (Spain)
Heath, Craig Symbian (UK)
Jürjens, Jan The Open University (UK)
Lambrinoudakis, Kostas University of the Aegean (Greece)
Maña, Antonio University of Malaga (Spain)
Mouratidis, Haralambos University of East London (UK)
Ray, Indrakshi Colorado State University (USA)
Schumacher, Markus Virtual Forge GmbH & Fraunhofer SIT (Germany)
Sommerlad, Peter HSR Hochschule für Technik Rapperswil (Switzerland)
Thomsen, Dan Cyber Defense Agency (USA)
VanHilst, Michael Florida Atlantic University (USA)
Washizaki, Hironori National Institute of Informatics, Tokyo (Japan)
Yoder, Joe The Refactory, Inc. (USA)
Yoshioka, Nobukazu National Institute of Informatics, Tokyo (Japan)
*******
CONTACT
*******
Questions concerning the Call for Papers or submissions should be send
by E-Mail to: guenther.pernul@wiwi.uni-regensburg.de or ed@cse.fau.edu
Questions concerning the organization of the conference should be send
by E-Mail to: office@dexa.org
Prof. Dr. Eduardo B. Fernandez
Professor of Computer Science & Engineering
Department of Computer Science and Engineering
Florida Atlantic University
777 Glades Road
Boca Raton, FL 33431 - USA
ed@cse.fau.edu
Prof. Dr. Günther Pernul
Department of Information Systems
Universitätstr. 31
D-93053 Regensburg
Germany
guenther.pernul@wiwi.uni-regensburg.de
This CfP was obtained from WikiCFP