7th International Conference on
Enterprise Information Systems

Workshops   

Workshops Paper Submission: deadline passed
Workshops Author Notification:
8th March 2005 (new date)
Workshops Camera-Ready Submission and Registration: 18th March 2005

 
 

Home
Call For Papers
Doctoral Consortium
Program Committee
Keynote Lectures
Tutorials
Special Sessions
Workshops

Paper Submission
Paper Templates
Reviewers Only
Registration

Conference Program
Local Information
Accommodation
Social Events

Organizing Committee
Sponsors
Journals
Hall of Fame
Links

Organized by:

INSTICC

Co-organized by:







The First International Workshop on

Protection by Adaptation
PBA-2005

May 24, 2005 Miami, USA

  First Announcement and Call for Papers 

 

In conjunction with the Seventh International Conference on Enterprise Information Systems - ICEIS 2005 (http://www.iceis.org/)  

 

PDF Version

 

Chair:

Ghita Kouadri Mostéfaoui ( Ghita.Kouadri-Mostefaoui@lip6.fr
LIP6
Université Paris VI, France

 

Workshop Background and Goals  

For most people, the term ”security” refers to cryptographic algorithms, biometric authentication techniques, passwords, etc. Beyond these intuitive notions, security is rather a very broad topic and may be viewed from a variety of other perspectives, including new access control models, software architectures for security systems, and security policies specifications.

Pervasive environments are the prime field for applying security due to the high frequency of attacks and incompatibilities detected in these types of environments. This situation results from the distributed nature of pervasive environments, mobility of users and devices, services heterogeneity and the different capabilities of devices used to access these services.

The aim of this workshop is to point the research community to better consider context-based security as a new trend that may face future more subtle security attacks. We believe that the force of a good security system should not rely only on the force of security protocols but also on the way it copes with new and completely unpredictable situations or at least learn from new situations and updates its behavior accordingly. This goal can be reached by making future security solutions freely adaptive.

We look for original submissions on the following topics (but not limited to):

• Dynamic security policies
• Context-based access control (GRBAC, …)
• Context in security
• Agile encryption
• AI in security
• Adaptive security solutions
• Middleware for context-based security systems
• Conflicting norms issues in security policies
• Flexible security architectures for pervasive applications
• Security contexts discovery, retrieval, representation and modeling
• Modeling users’ security profiles
• Metrics for evaluating pervasive computing security infrastructures
• Testing of adaptive security systems
• Software architectures for adaptive security (design patterns, etc)
• Adaptive security levels in heterogeneous environments
• Enforcing applications security semantics
• Metrics for predicting security threats

 

Format of the Workshop  

The workshop will consist of oral presentations. The proceedings of the workshop will be published in the form of a book by ICEIS with ISBN.

Submission of Papers

Prospective authors are invited to submit papers for oral presentation in any of the areas listed above. Only full papers in English will be accepted, and the length of the paper should not exceed 10 pages. Instructions for preparing the manuscript (in Word and Latex format) are available at the ICEIS web site. Postscript/RTF versions of the manuscript should be submitted thru ICEIS web-based paper submission procedure.

Important Dates  

Full paper submission: February 15, 2005
Author notification: March 8, 2005
Camera-ready paper submission: March 18, 2005

Workshop Program Committee

H. Bettahar (UTC, France)
P. Brézillon (Université Paris VI, France)
Y. Challal (UTC, France)
A. Derhab (CERIST, Algeria)
H. Diab (American University of Beirut, Lebanon)
D. Chiu Kak Wah (The Chinese University of Hong Kong)
S. Dietrich (Carnegie Mellon University, USA)
D. Djenouri (CERIST, Algeria)
P. Hung (University of Ontario, Canada)
I. Khalil Ibrahim (Johannes Kepler University Linz, Austria)
M. Kellil (UTC, France)
M. Khedr (Arab Academy for Science and Technology, Egypt)
L. Khelladi (CERIST, Algeria)
G. Kouadri M. (Université Paris VI, France)
S. Kouadri M. (University of Fribourg, Switzerland)
Z. Maamar (Zayed University, U.A.E)
N.C. Narendra (IBM, India)
M. Nunez (Universidad Complutense de Madrid, Spain)
L. Pierson (Sandia National Laboratories, USA)
K. Pousttchi (University of Augsburg, Germany)
P. Robertson (Sandia National Laboratories, USA)
L. Ruf (ETHZ, Switzerland)
A. Tveit (NTNU, Norway)
M. Vargas Martin (University of Ontario, Canada)
E. Witzke (Sandia National Laboratories, USA)
H. Yahyaoui (CIISE, Canada)
M. Yousif (Intel Corporation, USA)


Venue
 

The workshop will be held at Deauville Beach Resort in Miami, USA.

Registration Information  

To attend the workshop you need to register at http://www.iceis.org

Secretariat

ICEIS 2005 Secretariat - The First International Workshop on Protection by Adaptation
E-mail: workshops@iceis.org


Page Updated on 04-03-2005

Copyright © INSTICC