- From: KOUADRI MOSTEFAOUI Ghita <ghita.kouadrimostefaoui@unifr.ch>
- Date: Thu, 27 Jan 2005 10:16:17 +0100
- To: <www-ws@w3.org>, <announce@aosd.net>, <Lotos-World@site.uottawa.ca>, <www-rdf-interest@w3.org>, <A.Slingerland@ewi.tudelft.nl>, <tfcc-l@bucknell.edu>, <ontology@ieee.org>, <standard-upper-ontology@ieee.org>, <agents@cs.umbc.edu>, <corba-comp@moriarty.dif.um.es>, <haskell@haskell.org>, <tccc@cs.columbia.edu>, <cabernet-events@jiscmail.ac.uk>, <sm-frameworks@gridforum.org>
- Message-ID: <24D0F1947691984E89F3151A7DC314DDAC2109@EXCHANGE2.unifr.ch>
CALL FOR PAPERS ----------------------------------------------------------------------------------------------------------------------------------------------- First International Workshop on Protection by Adaptation (PBA 2005) May 24, 2005, Miami, USA http://www.iceis.org/workshops/pba/pba2005-cfp.html In conjunction with the 7th International Conference on Enterprise Information Systems (ICEIS 2005) http://www.iceis.org/ ------------------------------------------------------------------------------------------------------------------------------------------------ Scope and Topics ================ For most people, the term security refers to cryptographic algorithms, biometric authentication techniques, passwords, etc. Beyond these intuitive notions, security is rather a very broad topic and may be viewed from a variety of other perspectives, including new access control models, software architectures for security systems, and security policies specifications. Pervasive environments are the prime field for applying security due to the high frequency of attacks and incompatibilities detected in these types of environments. This situation results from the distributed nature of pervasive environments, mobility of users and devices, services heterogeneity and the different capabilities of devices used to access these services. The aim of this workshop is to point the research community to better consider context-based security as a new trend that may face future more subtle security attacks. We believe that the force of a good security system should not rely only on the force of security protocols but also on the way it copes with new and completely unpredictable situations or at least learn from new situations and updates its behavior accordingly. This goal can be reached by making future security solutions freely adaptive. We look for original submissions on the following topics (but not limited to): + Security in pervasive computing + Dynamic security policies + Context-based access control + Context in security + Agile encryption + AI in security + Adaptive security solutions + Middleware for context-based security systems + Conflicting norms issues in security policies + Flexible security architectures for pervasive applications + Security contexts discovery, retrieval, representation and modeling + Modeling users security profiles + Metrics for evaluating pervasive computing security infrastructures + Testing of adaptive security systems + Software architectures for adaptive security (design patterns, etc) + Adaptive security levels in heterogeneous environments + Enforcing applications security semantics + Metrics for predicting security threats Submission of papers ==================== Prospective authors are invited to submit papers for oral presentation in any of the areas listed above. Only full papers in English will be accepted, and the length of the paper should not exceed 10 pages (5000 words). Instructions for preparing the manuscript (in Word and Latex format) are available at the ICEIS web site. Postscript/RTF versions of the manuscript should be submitted thru ICEIS web-based paper submission procedure http://www.iceis.org/. Important dates =============== Submission deadline: February 15, 2005 Notification of acceptance: March 4, 2005 Camera-ready and registration: March 18, 2005 Format of the workshop ====================== The workshop will consist of oral presentations. The proceedings of the workshop will be published in the form of a book by ICEIS with ISBN. Program committee ================= H. Bettahar (UTC, France) P. Brézillon (Université Paris VI, France) Y. Challal (UTC, France) A. Derhab (CERIST, Algeria) H. Diab (American University of Beirut, Lebanon) D. Chiu Kak Wah (The Chinese Univesity of Hong Kong) S. Dietrich (Carnegie Mellon University, USA) D. Djenouri (CERIST, Algeria) P. Hung (University of Ontario, Canada) I. Khalil Ibrahim (Johannes Kepler University Linz, Austria) M. Kellil (UTC, France) M. Khedr (Arab Academy for Science and Technology, Egypt) L. Khelladi (CERIST, Algeria) G. Kouadri M. (Université Paris VI, France) S. Kouadri M. (University of Fribourg, Switzerland) Z. Maamar (Zayed University, U.A.E) N.C. Narendra (IBM, India) M. Nunez (Universidad Complutense de Madrid, Spain) L. Pierson (Sandia National Laboratories, USA) K. Pousttchi (University of Augsburg, Germany) P. Robertson (Sandia National Laboratories, USA) L. Ruf (ETHZ, Switzerland) A. Tveit (NTNU, Norway) M. Vargas Martin (University of Ontario, Canada) E. Witzke (Sandia National Laboratories, USA) H. Yahyaoui (CIISE, Canada) M. Yousif (Intel Corporation, USA) Workshop chair ============== Ghita Kouadri Mostéfaoui LIP6 Université Paris 6, France Ghita.Kouadri-Mostefaoui@lip6.fr Workshop location ================= The workshop will be held at Deauville Beach Resort in Miami, USA. Registration Information ======================== To attend the workshop you need to register at http://www.iceis.org Secretariat =========== ICEIS 2005 Secretariat - First International Workshop on Protection by Adaptation (PBA 2005) E-mail: workshops@iceis.org Web site: http://www.iceis.org
Received on Thursday, 27 January 2005 10:56:21 UTC