Please forward to your colleagues, if interested
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
STPSA 2018 workshop (https://ieeecompsac.computer.org/2018/stpsa/) will
bring researchers from academia and industry to discuss methods and tools to achieve security, trust, and privacy goals of both pervasive and non-pervasive software applications. This workshop will focus on techniques, experiences and lessons learned with
respect to the state of art for the security, trust, and privacy aspects of both pervasive and non-pervasive software applications along with some open issues.
Information security has become a major concern for software and applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and
trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should
be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools
to achieve security, trust, and privacy goals. Further, emerging techniques such as blockchain brings on new challenges to adopt them into developing STP-aware software and applications.
As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.
Topics of interest include, but are not limited to, the following:
Program Co-Chairs
Hossain Shahriar, Kennesaw State University, USA
Natalia Stakhnova, University of New Brunswick, Canada
Debbie Perouli, Marquette University, USA