Skip to Content.
Sympa Menu

patterns-discussion - [patterns-discussion] CFP - 4th Int Workshop Secure Systems Methodologies

patterns-discussion AT lists.cs.illinois.edu

Subject: General talk about software patterns

List archive

[patterns-discussion] CFP - 4th Int Workshop Secure Systems Methodologies


Chronological Thread 
  • From: Linda Rising <risingl1 AT cox.net>
  • To: Hillside Members <members AT hillside.net>, Hillside Europe <membersHillsideEurope AT yahoogroups.com>, Patterns Discussion <patterns-discussion AT cs.uiuc.edu>, gang_of_4_list <gang-of-4-patterns AT cs.uiuc.edu>, TelePLoP List <telecom-patterns AT cs.uiuc.edu>, Shepherd <shepherd AT hillside.net>
  • Subject: [patterns-discussion] CFP - 4th Int Workshop Secure Systems Methodologies
  • Date: Thu, 20 Aug 2009 09:16:48 -0700
  • List-archive: <http://lists.cs.uiuc.edu/pipermail/patterns-discussion>
  • List-id: General talk about software patterns <patterns-discussion.cs.uiuc.edu>

Sorry for multiple postings.


CALL FOR PAPERS

***********************************************************************
4th International Workshop on Secure systems methodologies
using patterns (SPattern 2010)
in conjunction with the
5th International Conference on
Availability, Reliability and Security (ARES 2010)
Krakow, Poland, February, 15th - 18th 2010
http://www-ifs.uni-regensburg.de/spattern10/
***********************************************************************

****************************
GOALS AND TOPICS OF INTEREST
****************************

Security patterns have arrived to a stage where there are a significant
number of them, two books about them have been published, and industry
is starting to accept and use them. Analysis and design patterns have
been around for about ten years and have found practical use in many
projects. They have been incorporated into several software development
methodologies where less experienced developers can use them to receive
the advice and knowledge of experts. The situation is not so clear for
security patterns because no accepted methodology exists for their use.

Catalogs of security patterns are a good step, but they are not enough.
Building secure systems is a difficult process where security aspects
are interlaced with the satisfaction of functional requirements.
Developers are typically experts on a language or a development
methodology but know little about security, which results in them not
knowing what security mechanisms make sense at which moments. We need
methodologies that guide a designer at each stage of the development
cycle. A few of them have appeared, but none of them has been tested in
production applications.

This workshop focuses on secure software methodologies. We seek papers
describing individual security patterns, new methodologies, new aspects
of existing methodologies, pattern languages to use in the
methodologies, reference architectures, blueprints, and related
aspects. Experiences in applying the methodologies to real situations
are especially welcome.

******************
SUBMISSION DETAILS
******************

Authors are invited to submit research contributions, practical
experience reports and demos.
Papers must be original not previously published nor submitted in
parallel for publication to any other conference, workshop or journal.
Submissions must be in pdf and consist of no more than 5 pages in IEEE
double column format.

At least one author of each accepted paper is required to attend the
conference and present the paper.

Important dates:
Submission Deadline October, 01st 2009
Author Notification November, 01st 2009
Author Registration November, 14th 2009
Proceedings Version November, 14th 2009
Conference February, 15th - 18th 2010

*****************
PROGRAM COMMITTEE
*****************

Workshop chairs
Fernandez, Eduardo B. Florida Atlantic University (USA)
Pernul, Günther University of Regensburg (Germany)

Program Committee

Program Committee
Fernandez-Medina, Eduardo Universidad de Castilla-La Mancha (Spain)
Jürjens, Jan The Open University (UK)
Lambrinoudakis, Kostas University of the Aegean (Greece)
Maña, Antonio University of Malaga (Spain)
Mouratidis, Haralambos University of East London (UK)
Munoz-Arteaga, Jaime University of Aguascalientes (Mexico)
Sommerlad, Peter HSR Hochschule für Technik Rapperswil
(Switzerland)
Song, Eujeen Baylor University (USA)
Thomsen, Dan Cyber Defense Agency (USA)
VanHilst, Michael Florida Atlantic University (USA)
Washizaki, Hironori National Institute of Informatics, Tokyo
(Japan)
Yoder, Joe The Refactory, Inc. (USA)
Yoshioka, Nobukazu National Institute of Informatics, Tokyo
(Japan)

*******
CONTACT
*******

Questions concerning the Call for Papers or submissions should be send
by E-Mail to:
guenther.pernul AT wiwi.uni-regensburg.de
or
ed AT cse.fau.edu


Prof. Dr. Eduardo B. Fernandez
Professor of Computer Science & Engineering
Department of Computer Science and Engineering
Florida Atlantic University
777 Glades Road
Boca Raton, FL 33431 - USA
ed AT cse.fau.edu

Prof. Dr. Günther Pernul
Department of Information Systems
Universitätstr. 31
D-93053 Regensburg
Germany
guenther.pernul AT wiwi.uni-regensburg.de
_______________________________________________
Please do not post msgs that are not relevant to the database community at large. Go to www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld

-- Dr. Eduardo B. Fernandez Professor,Dept. of Computer Science and Eng. Florida Atlantic University 777 Glades Rd. Boca Raton, FL 33431 Tel. 561-297-3466 Fax 561-297-2800 e-mail : ed AT cse.fau.edu http://www.cse.fau.edu/~ed




  • [patterns-discussion] CFP - 4th Int Workshop Secure Systems Methodologies, Linda Rising, 08/20/2009

Archive powered by MHonArc 2.6.16.

Top of Page