caml-list - the Caml user's mailing list
 help / color / mirror / Atom feed
From: Andrea Calvagna <calvagna@cs.unict.it>
To: Emiliano Tramontana <tramontana@dmi.unict.it>
Cc: Andrea Calvagna <calvagna@cs.unict.it>
Subject: [Caml-list] VSC 2014 call for papers
Date: Mon, 25 Nov 2013 11:37:59 +0100	[thread overview]
Message-ID: <9F5F7125-C116-41CC-911A-A7E2899D05EF@cs.unict.it> (raw)

[-- Attachment #1: Type: text/plain, Size: 4207 bytes --]

VSC 2014: 2nd Track on Validation of Safety critical Collaboration systems,                                   
in 23rd IEEE WETICE International Conference - June 23-25, 2014 Parma - Italy 
http://cmt.dmi.unipr.it/wetice14/

Call For Papers
-----------------------------------------------------------------------------------
This conference track brings the opportunity for researchers and developers from industry and the academic world to report the state of the art and exchange ideas about the support that should be provided in order to enforce confidentiality, security and reliability on the next generation of software technologies enabling collaborations among people. Such a support will enhance the level of quality and of user trust on services involving collaboration with unknown remote parties. 
Nowadays widespread use of small, smart devices, such as smart cards, phones, and tablets, connected by the ubiquitous public Internet network, enable us to easily access a vast range of useful services. Such devices allow people to perform every day activities that either play a role in a collaborative task or are actually supported by some real-time or asynchronous collaboration technology. 
Example services are the trading of goods, remote writing or signing of digital documents, joining social networks or work groups, remotely locating someone or something, and even services improving our ability to observe/control the environment
around us. 
In this context, applications that hold or exchange sensitive user data, like i.e. ATM cards storing security pin-codes, or healthcare applications using biometric data, need special protection against software failures or malicious behavior of downloaded code, that may expose the user to highly undesired consequences, such as threats to confidentiality and even financial or health danger. 
This is even more true since the trend is indeed towards integration, that is, not to have many specialized access devices but a single, multi-purpose host handling many (or all) kinds of user services and its related data together, even though with limited computing resources, such as any small device hosting a Java or .Net run-time environment. 
Moreover, inherent mobility and distribution of these small, open computing devices increases the complexity of the solutions to be adopted for handling secure and reliable execution of untrusted code, in order to ensure the data confidentiality strongly required by the applications.  As a consequence, new and specially designed techniques  can be devised and applied in order to reach the goal of increasing the trust on such a distributed computing environment to a level of strength matching with the high strength of the above safety critical requirements.

Submission is encouraged, but not limited, to the following topics:
	- Verification techniques tailored to embedded software
	- Novel testing and validation algorithms 
	- Dependability assessment techniques 
	- Model-based validation and testing techniques for security
	- Analysis of threats and countermeasures to the security of smart devices
	- Static and run-time techniques for byte-code level verification and validation
	- Validation testing of safety critical technologies
	- Validation of large-scale distributed applications
	- Software testing in multi-core environments 
	- Risk-based approaches to software validation
	- Assessing security and robustness of applications  
	- New software architectures for securing software on collaboration devices
	- Performance analysis of security-related features
	- Performance and QoS testing
	- Testing and analysis tools

The conference proceedings will be published by the IEEE Computer Society Press. Special Issues of several international journals have been programmed with submission open by invitation only to authors of high quality papers.  


Paper submission (page limit 6 PAGES for full papers) : February 4, 2014 
Notification to authors: March 14, 2014
Camera-ready papers to IEEE (page limit 6 pages) : April 11, 2014 
Track reports by Track Chairs to IEEE (Page limit 6 pages) : April 11, 2014 
                         

[-- Attachment #2: Type: text/html, Size: 8118 bytes --]

                 reply	other threads:[~2013-11-25 10:38 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=9F5F7125-C116-41CC-911A-A7E2899D05EF@cs.unict.it \
    --to=calvagna@cs.unict.it \
    --cc=tramontana@dmi.unict.it \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).