W3C home > Mailing lists > Public > www-rdf-interest@w3.org > January 2005

ICEIS'2005- First International Workshop on Protection by Adaptation PBA'2005

From: KOUADRI MOSTEFAOUI Ghita <ghita.kouadrimostefaoui@unifr.ch>
Date: Thu, 27 Jan 2005 10:16:17 +0100
Message-ID: <24D0F1947691984E89F3151A7DC314DDAC2109@EXCHANGE2.unifr.ch>
To: <www-ws@w3.org>, <announce@aosd.net>, <Lotos-World@site.uottawa.ca>, <www-rdf-interest@w3.org>, <A.Slingerland@ewi.tudelft.nl>, <tfcc-l@bucknell.edu>, <ontology@ieee.org>, <standard-upper-ontology@ieee.org>, <agents@cs.umbc.edu>, <corba-comp@moriarty.dif.um.es>, <haskell@haskell.org>, <tccc@cs.columbia.edu>, <cabernet-events@jiscmail.ac.uk>, <sm-frameworks@gridforum.org>



First International Workshop on Protection by Adaptation (PBA 2005)

May 24, 2005, Miami, USA 



In conjunction with the 7th International Conference on Enterprise Information Systems (ICEIS 2005)







Scope and Topics



For most people, the term security refers to cryptographic algorithms, biometric authentication techniques, passwords, etc. Beyond these 

intuitive notions, security is rather a very broad topic and may be viewed from a variety of other perspectives, including new access 

control models, software architectures for security systems, and security policies specifications. 

Pervasive environments are the prime field for applying security due to the high frequency of attacks and incompatibilities detected 

in these types of environments. This situation results from the distributed nature of pervasive environments, mobility of users and devices,

services heterogeneity and the different capabilities of devices used to access these services.


The aim of this workshop is to point the research community to better consider context-based security as a new trend that may face future 

more subtle security attacks. We believe that the force of a good security system should not rely only on the force of security protocols 

but also on the way it copes with new and completely unpredictable situations or at least 

learn from new situations and updates its behavior accordingly. This goal can be reached by making future security solutions freely adaptive.


We look for original submissions on the following topics (but not limited to):



+ Security in pervasive computing

+ Dynamic security policies

+ Context-based access control

+ Context in security

+ Agile encryption

+ AI in security

+ Adaptive security solutions

+ Middleware for context-based security systems

+ Conflicting norms issues in security policies

+ Flexible security architectures for pervasive applications

+ Security contexts discovery, retrieval, representation and modeling 

+ Modeling users security profiles

+ Metrics for evaluating pervasive computing security infrastructures

+ Testing of adaptive security systems

+ Software architectures for adaptive security (design patterns, etc)

+ Adaptive security levels in heterogeneous environments

+ Enforcing applications security semantics

+ Metrics for predicting security threats





Submission of papers



Prospective authors are invited to submit papers for oral presentation in any of the areas listed above. Only full papers in English will be accepted, and the length of the paper should not 

exceed 10 pages (5000 words). Instructions for preparing the manuscript (in Word and Latex format) are available at the ICEIS web site. 

Postscript/RTF versions of the manuscript should be submitted thru ICEIS web-based paper submission procedure http://www.iceis.org/.



Important dates



Submission deadline: February 15, 2005

Notification of acceptance: March 4, 2005

Camera-ready and registration: March 18, 2005 



Format of the workshop



The workshop will consist of oral presentations. The proceedings of the workshop will be published in the form of a book by ICEIS with ISBN.




Program committee



H. Bettahar (UTC, France)

P. Brézillon (Université Paris VI, France) 

Y. Challal (UTC, France)

A. Derhab (CERIST, Algeria)

H. Diab (American University of Beirut, Lebanon)

D. Chiu Kak Wah (The Chinese Univesity of Hong Kong)

S. Dietrich (Carnegie Mellon University, USA)

D. Djenouri (CERIST, Algeria)

P. Hung (University of Ontario, Canada)

I. Khalil Ibrahim (Johannes Kepler University Linz, Austria)

M. Kellil (UTC, France)

M. Khedr (Arab Academy for Science and Technology, Egypt)

L. Khelladi (CERIST, Algeria)

G. Kouadri M. (Université Paris VI, France)

S. Kouadri M. (University of Fribourg, Switzerland)

Z. Maamar (Zayed University, U.A.E)

N.C. Narendra (IBM, India)

M. Nunez (Universidad Complutense de Madrid, Spain) 

L. Pierson (Sandia National Laboratories, USA)

K. Pousttchi (University of Augsburg, Germany) 

P. Robertson (Sandia National Laboratories, USA)

L. Ruf (ETHZ, Switzerland)

A. Tveit (NTNU, Norway)

M. Vargas Martin (University of Ontario, Canada) 

E. Witzke (Sandia National Laboratories, USA)

H. Yahyaoui (CIISE, Canada)

M. Yousif (Intel Corporation, USA)



Workshop chair



Ghita Kouadri Mostéfaoui


Université Paris 6, France




Workshop location



The workshop will be held at Deauville Beach Resort in Miami, USA.



Registration Information 



To attend the workshop you need to register at http://www.iceis.org  





ICEIS 2005 Secretariat - First International Workshop on Protection by Adaptation (PBA 2005)

E-mail: workshops@iceis.org 

Web site: http://www.iceis.org  

Received on Thursday, 27 January 2005 10:56:21 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 22:44:54 UTC