Skip to Content.
Sympa Menu

patterns-discussion - [patterns-discussion] 2nd Int. Workshop on Secure Systems Methodologies Using Patterns

patterns-discussion AT lists.cs.illinois.edu

Subject: General talk about software patterns

List archive

[patterns-discussion] 2nd Int. Workshop on Secure Systems Methodologies Using Patterns


Chronological Thread 
  • From: Linda Rising <risingl1 AT cox.net>
  • To: Shepherd <shepherd AT hillside.net>, Hillside Members <members AT hillside.net>, Hillside Europe <membersHillsideEurope AT yahoogroups.com>, Patterns Discussion <patterns-discussion AT cs.uiuc.edu>, All PLoP Attendees <plopattendees AT hillside.net>
  • Subject: [patterns-discussion] 2nd Int. Workshop on Secure Systems Methodologies Using Patterns
  • Date: Mon, 25 Feb 2008 08:26:00 -0700
  • List-archive: <http://lists.cs.uiuc.edu/pipermail/patterns-discussion>
  • List-id: General talk about software patterns <patterns-discussion.cs.uiuc.edu>

Sorry for multiple postings.


Second Int. Workshop on Secure Systems Methodologies Using Patterns
(SPatterns'08)

in conjunction with the
5th International Conference on Trust, Privacy & Security in
Digital Business (TrustBus'08)
and the
19th International Conference on Database and
Expert Systems Applications (DEXA 2008)

Turin, Italy, September 01-05, 2008

http://www-ifs.uni-regensburg.de/spattern08/


GOALS AND TOPICS OF INTEREST
Security patterns have arrived to a stage where there are a significant
number of them, two books about them have been published, and industry
is starting to accept and use them. Analysis and design patterns have
been around for about ten years and have found practical use in many
projects. They have been incorporated into several software development
methodologies where less experienced developers can use them to receive
the advice and knowledge of experts. The situation is not so clear for
security patterns because no accepted methodology exists for their use.

Catalogs of security patterns are a good step, but they are not
enough.
Building secure systems is a difficult process where security aspects
are interlaced with the satisfaction of functional requirements.
Developers are typically experts on a language or a development
methodology but know little about security, which results in them not
knowing what security mechanisms make sense at which moments. We need
methodologies that guide a designer at each stage of the development
cycle. A few of them have appeared, but none of them has been tested in
production applications.

This workshop focuses on secure software methodologies. We seek papers
describing individual security patterns, new methodologies, new aspects
of existing methodologies, pattern languages to use in the
methodologies, reference architectures, blueprints, and related
aspects.
Experiences in applying the methodologies to real situations are
especially welcome.


IMPORTANT DATES
Submission of abstract: March, 16th, 2008
Submission of full paper: March, 23rd 2008
Notification to authors: May, 9th, 2008
Final version due: May, 30th, 2008


SUBMISSION DETAILS
Authors are invited to submit research contributions, practical
experience reports and demos. Papers must be original and not previously
published nor submitted in parallel for publication to any other
conference, workshop or journal. Submissions must be in pdf and consist
of no more than 5 pages in IEEE double column format.

Accepted papers will be included in the DEXA workshop proceedings, to
be published by IEEE and available at the conference site. Final
versions of the papers must comply with "Authors Instructions" which are
accessible at: www.computer.org/portal/site/cscps/index.jsp

Submissions should be sent to
guenther.pernul AT wiwi.uni-regensburg.de
*and*
ed AT cse.fau.edu.
For further inquiries, please contact either of
the program committee chairs. The conference organization office can be
reached at
gabriela AT faw.uni-linz.ac.at.


WORKSHOP CHAIRS
Eduardo B. Fernandez Florida Atlantic University (USA)
Gunther Pernul University of Regensburg (Germany)

PROGRAM COMMITTEE
Fernandez-Medina, Eduardo Universidad de Castilla-La Mancha (Spain)
Heath, Craig Symbian (UK)
Jürjens, Jan The Open University (UK)
Lambrinoudakis, Kostas University of the Aegean (Greece)
Larrondo-Petrie, Maria M. Florida Atlantic University (USA)
Maña, Antonio University of Malaga (Spain)
Mouratidis, Haralambos University of East London (UK)
Ray, Indrakshi Colorado State University (USA)
Schumacher, Markus Virtual Forge & Fraunhofer SIT (Germany)
Sommerlad, Peter HSR (Switzerland)
Thomsen, Dan Cyber Defense Agency (USA)
VanHilst, Michael Florida Atlantic University (USA)
Washizaki, Hironori National Institute of Informatics, Tokyo (Japan)
Yoder, Joe Independent Consultant (USA)
Yoshioka, Nobukazu Institute of Informatics, Tokyo (Japan)
_______________________________________________



  • [patterns-discussion] 2nd Int. Workshop on Secure Systems Methodologies Using Patterns, Linda Rising, 02/25/2008

Archive powered by MHonArc 2.6.16.

Top of Page