|
CALL FOR PAPERS ----------------------------------------------------------------------------------------------------------------------------------------------- First International Workshop on Protection by Adaptation (PBA
2005) May 24, 2005, http://www.iceis.org/workshops/pba/pba2005-cfp.html In conjunction with the 7th International Conference on
Enterprise Information Systems (ICEIS 2005) http://www.iceis.org/ ------------------------------------------------------------------------------------------------------------------------------------------------ Scope and Topics ================ For most people, the term security refers to cryptographic
algorithms, biometric authentication techniques, passwords, etc. Beyond these intuitive notions, security is rather a very broad topic and
may be viewed from a variety of other perspectives, including new access control models, software architectures for security systems,
and security policies specifications. Pervasive environments are the prime field for applying security
due to the high frequency of attacks and incompatibilities detected in these types of environments. This situation results from
the distributed nature of pervasive environments, mobility of users and devices, services heterogeneity and the different capabilities of
devices used to access these services. The aim of this workshop is to point the research community
to better consider context-based security as a new trend that may face future more subtle security attacks. We believe that the force of a
good security system should not rely only on the force of security protocols but also on the way it copes with new and completely
unpredictable situations or at least learn from new situations and updates its behavior
accordingly. This goal can be reached by making future security solutions
freely adaptive. We look for original submissions on the following topics (but
not limited to): + Security in pervasive computing + Dynamic security policies + Context-based access control + Context in security + Agile encryption + AI in security + Adaptive security solutions + Middleware for context-based security systems + Conflicting norms issues in security policies + Flexible security architectures for pervasive applications + Security contexts discovery, retrieval, representation and
modeling + Modeling users security profiles + Metrics for evaluating pervasive computing security
infrastructures + Testing of adaptive security systems + Software architectures for adaptive security (design
patterns, etc) + Adaptive security levels in heterogeneous environments + Enforcing applications security semantics + Metrics for predicting security threats � Submission of papers ==================== Prospective authors are invited to submit papers for oral
presentation in any of the areas listed above. Only full papers in English will
be accepted, and the length of the paper should not exceed 10 pages (5000 words). Instructions for preparing the
manuscript (in Word and Latex format) are available at the ICEIS web site. Postscript/RTF versions of the manuscript should be
submitted thru ICEIS web-based paper submission procedure http://www.iceis.org/. � Important dates =============== Submission deadline: February 15, 2005 Notification of acceptance: March 4, 2005 Camera-ready and registration: March 18, 2005 � Format of the workshop ====================== The workshop will consist of oral presentations. The
proceedings of the workshop will be published in the form of a book by ICEIS
with ISBN. � Program committee ================= H. Bettahar (UTC, France) P. Br�zillon (Universit� Paris VI, France) Y. Challal (UTC, France) A. Derhab (CERIST, H. Diab (American D. Chiu Kak Wah (The Chinese Univesity of S. Dietrich ( D. Djenouri (CERIST, P. Hung ( I. Khalil Ibrahim ( M. Kellil (UTC, France) M. Khedr ( L. Khelladi (CERIST, Algeria) G. Kouadri M. (Universit� Paris VI, France) S. Kouadri M. ( Z. Maamar ( N.C. Narendra (IBM, India) M. Nunez (Universidad Complutense de Madrid, Spain) L. Pierson (Sandia National Laboratories, USA) K. Pousttchi (University of Augsburg, Germany) P. Robertson (Sandia National Laboratories, USA) L. Ruf (ETHZ, A. Tveit (NTNU, M. Vargas Martin ( E. Witzke (Sandia National Laboratories, H. Yahyaoui (CIISE, M. Yousif (Intel Corporation, Workshop chair ============== Ghita Kouadri Most�faoui LIP6 Universit� Paris 6, France Workshop location ================= � The workshop will be held at Deauville Beach Resort in Registration Information ======================== To attend the workshop you need to register at http://www.iceis.org�
Secretariat =========== ICEIS 2005 Secretariat - First International Workshop on
Protection by Adaptation (PBA 2005) E-mail: Web site: http://www.iceis.org� |
_______________________________________________ Haskell mailing list [email protected] http://www.haskell.org/mailman/listinfo/haskell
