From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id BBB1C7EE6B for ; Mon, 25 Nov 2013 11:38:55 +0100 (CET) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of calvagna@cs.unict.it) identity=pra; client-ip=151.97.252.131; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="calvagna@cs.unict.it"; x-sender="calvagna@cs.unict.it"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of calvagna@cs.unict.it) identity=mailfrom; client-ip=151.97.252.131; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="calvagna@cs.unict.it"; x-sender="calvagna@cs.unict.it"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@mbox.dmi.unict.it) identity=helo; client-ip=151.97.252.131; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="calvagna@cs.unict.it"; x-sender="postmaster@mbox.dmi.unict.it"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AuEBAGcnk1KXYfyDmWdsb2JhbABZgkN8tCuIT4EnFg4BAQEBAQgLCwcUKIJJSxGBPi6Hagm9QI4vAVeDJ4ETA5QxiieOdzuBLAEBHgY X-IPAS-Result: AuEBAGcnk1KXYfyDmWdsb2JhbABZgkN8tCuIT4EnFg4BAQEBAQgLCwcUKIJJSxGBPi6Hagm9QI4vAVeDJ4ETA5QxiieOdzuBLAEBHgY X-IronPort-AV: E=Sophos;i="4.93,766,1378850400"; d="scan'208,217";a="37746415" Received: from mbox.dmi.unict.it ([151.97.252.131]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/ADH-AES256-SHA; 25 Nov 2013 11:38:54 +0100 Received: from localhost (localhost [127.0.0.1]) by mbox.dmi.unict.it (Postfix) with ESMTP id CDAA024EC; Mon, 25 Nov 2013 11:38:08 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at mbox.dmi.unict.it Received: from mbox.dmi.unict.it ([127.0.0.1]) by localhost (mbox.dmi.unict.it [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4vgQtvC0W+eW; Mon, 25 Nov 2013 11:38:07 +0100 (CET) Received: from [192.168.45.100] (unknown [192.168.45.100]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: calvagna) by mbox.dmi.unict.it (Postfix) with ESMTPSA id 786A624CD; Mon, 25 Nov 2013 11:38:01 +0100 (CET) From: Andrea Calvagna Content-Type: multipart/alternative; boundary="Apple-Mail=_26CF4C2E-15E3-4B84-A435-24850FD0B0B7" Message-Id: <9F5F7125-C116-41CC-911A-A7E2899D05EF@cs.unict.it> Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) Date: Mon, 25 Nov 2013 11:37:59 +0100 Cc: Andrea Calvagna To: Emiliano Tramontana X-Mailer: Apple Mail (2.1510) X-Validation-by: calvagna.andrea@gmail.com Subject: [Caml-list] VSC 2014 call for papers --Apple-Mail=_26CF4C2E-15E3-4B84-A435-24850FD0B0B7 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii VSC 2014: 2nd Track on Validation of Safety critical Collaboration systems,= =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20= =20=20=20=20=20=20=20=20=20=20 in 23rd IEEE WETICE International Conference - June 23-25, 2014 Parma - Ita= ly=20 http://cmt.dmi.unipr.it/wetice14/ Call For Papers ---------------------------------------------------------------------------= -------- This conference track brings the opportunity for researchers and developers= from industry and the academic world to report the state of the art and ex= change ideas about the support that should be provided in order to enforce = confidentiality, security and reliability on the next generation of softwar= e technologies enabling collaborations among people. Such a support will en= hance the level of quality and of user trust on services involving collabor= ation with unknown remote parties.=20 Nowadays widespread use of small, smart devices, such as smart cards, phone= s, and tablets, connected by the ubiquitous public Internet network, enable= us to easily access a vast range of useful services. Such devices allow pe= ople to perform every day activities that either play a role in a collabora= tive task or are actually supported by some real-time or asynchronous colla= boration technology.=20 Example services are the trading of goods, remote writing or signing of dig= ital documents, joining social networks or work groups, remotely locating s= omeone or something, and even services improving our ability to observe/con= trol the environment around us.=20 In this context, applications that hold or exchange sensitive user data, li= ke i.e. ATM cards storing security pin-codes, or healthcare applications us= ing biometric data, need special protection against software failures or ma= licious behavior of downloaded code, that may expose the user to highly und= esired consequences, such as threats to confidentiality and even financial = or health danger.=20 This is even more true since the trend is indeed towards integration, that = is, not to have many specialized access devices but a single, multi-purpose= host handling many (or all) kinds of user services and its related data to= gether, even though with limited computing resources, such as any small dev= ice hosting a Java or .Net run-time environment.=20 Moreover, inherent mobility and distribution of these small, open computing= devices increases the complexity of the solutions to be adopted for handli= ng secure and reliable execution of untrusted code, in order to ensure the = data confidentiality strongly required by the applications. As a consequen= ce, new and specially designed techniques can be devised and applied in or= der to reach the goal of increasing the trust on such a distributed computi= ng environment to a level of strength matching with the high strength of th= e above safety critical requirements. Submission is encouraged, but not limited, to the following topics: - Verification techniques tailored to embedded software - Novel testing and validation algorithms=20 - Dependability assessment techniques=20 - Model-based validation and testing techniques for security - Analysis of threats and countermeasures to the security of smart devices - Static and run-time techniques for byte-code level verification and vali= dation - Validation testing of safety critical technologies - Validation of large-scale distributed applications - Software testing in multi-core environments=20 - Risk-based approaches to software validation - Assessing security and robustness of applications=20=20 - New software architectures for securing software on collaboration devices - Performance analysis of security-related features - Performance and QoS testing - Testing and analysis tools The conference proceedings will be published by the IEEE Computer Society P= ress. Special Issues of several international journals have been programmed= with submission open by invitation only to authors of high quality papers.= =20=20 Paper submission (page limit 6 PAGES for full papers) : February 4, 2014=20 Notification to authors: March 14, 2014 Camera-ready papers to IEEE (page limit 6 pages) : April 11, 2014=20 Track reports by Track Chairs to IEEE (Page limit 6 pages) : April 11, 2014= =20 =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20 --Apple-Mail=_26CF4C2E-15E3-4B84-A435-24850FD0B0B7 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii
VSC 2014: 2nd Track on Validation of Safety critica= l Collaboration systems,              &n= bsp;                    <= /b>
in 23rd IEEE WETICE = International Conference - June 23-25, 2014 Parma - Italy 

Call For Papers
----------------------------------------------------= -------------------------------
This conference track brings the opportunity f= or researchers and developers from industry and the academic world to repor= t the state of the art and exchange ideas about the support that should be = provided in order to enforce confidentiality, security and reliability on t= he next generation of software technologies enabling collaborations among p= eople. Such a support will enhance the level of quality and of user trust o= n services involving collaboration with unknown remote parties. 
=
Nowadays= widespread use of small, smart devices, such as smart cards, phones, and t= ablets, connected by the ubiquitous public Internet network, enable us to e= asily access a vast range of useful services. Such devices allow people to = perform every day activities that either play a role in a collaborative tas= k or are actually supported by some real-time or asynchronous collaboration= technology. 
Example services are the trading of goods, remote writing o= r signing of digital documents, joining social networks or work groups, rem= otely locating someone or something, and even services improving our abilit= y to observe/control the environment
around us. 
In this context, applicatio= ns that hold or exchange sensitive user data, like i.e. ATM cards storing s= ecurity pin-codes, or healthcare applications using biometric data, need sp= ecial protection against software failures or malicious behavior of downloa= ded code, that may expose the user to highly undesired consequences, such a= s threats to confidentiality and even financial or health danger. 
This i= s even more true since the trend is indeed towards integration, that is, no= t to have many specialized access devices but a single, multi-purpose host = handling many (or all) kinds of user services and its related data together= , even though with limited computing resources, such as any small device ho= sting a Java or .Net run-time environment. 
Moreover, inherent mobility a= nd distribution of these small, open computing devices increases the comple= xity of the solutions to be adopted for handling secure and reliable execut= ion of untrusted code, in order to ensure the data confidentiality strongly= required by the applications.  As a consequence, new and specially de= signed techniques  can be devised and applied in order to reach the go= al of increasing the trust on such a distributed computing environment to a= level of strength matching with the high strength of the above safety crit= ical requirements.

Submis= sion is encouraged, but not limited, to the following topics:
- Verification techniques tailored to embedded= software
- Novel testing and vali= dation algorithms 
= - Dependab= ility assessment techniques 
= - Model-based validation and testing techniques for security
- Analysis of threats and countermeasures to t= he security of smart devices
- Sta= tic and run-time techniques for byte-code level verification and validation=
- Validation testing of safety cr= itical technologies
- Validation o= f large-scale distributed applications
- Software testing in multi-core environments 
- Risk-based approaches to software validation
=
- Assessing security and robustness of = applications  
- New sof= tware architectures for securing software on collaboration devices
- Performance analysis of security-related= features
- Performance and QoS te= sting
- Testing and analysis tools=

<= /div>
The conference proceedin= gs will be published by the IEEE Computer Society Press. Special Issues of = several international journals have been programmed with submission open by= invitation only to authors of high quality papers.  


Paper submission (page limit 6 PAGES for full papers) : February 4, 20= 14 
Notification to authors: March 14, 2014
<= div style=3D"margin: 0px; font-size: 12px; font-family: Arial; color: rgb(4= 0, 40, 40); ">Camera-ready papers to IEEE (page limit 6 pages) : = April 11, 2014 
Track reports by Track Chairs to I= EEE (Page limit 6 pages) : April 11, 2014 

          =                

= --Apple-Mail=_26CF4C2E-15E3-4B84-A435-24850FD0B0B7--