compsac 2014 header image

COMPSAC 2015: The 39th Annual International Computers, Software & Applications Conference

Taichung, Taiwan - July 1-5, 2015

Mobile and Cloud Systems – Challenges and Applications

Questions about STPSA? Please contact the Program Chairs. 

 

Program Chairs

Dr. Chunfu JIA, College of Computer & Control, Nankai University, Tianjin 300071, China, (cfjia (at) nankai.edu.cn)

Dr. Farzana Rahman, James Madison University, Harrisonburg, Virginia, USA, (rahma2fx (at) jmu.edu)

 

General Chairs

Mohammad Zulkernine (Queen's University, Canada)

Sheikh Iqbal Ahamed (Marquette University, USA)

 

Program Committee

  • Atef Shalan, Bucknell University, USA.
  • Chunfu Jia, Nankai University, China.
  • George Yee, Carleton University, CA.
  • Hossain Shahriar, Kennesaw State University, USA.
  • Kyu H. Lee, University of Georgia, USA.
  • Mattia Monga, Università degli Studi di Milano, Italy.
  • Md. Endadul Hoque, Purdue University, USA.
  • Mohammad Asadul Hoque, East Tennessee State University, USA.
  • Moushumi Sharmin, University of Memphis, USA.
  • Stephan Johannes Eidenbenz, Los Alamos National Laboratory, USA.
  • Zakirul Alam Bhuyian, Central South University, China.

 

STPSA 2015: 10th IEEE International Workshop on Security, Trust, and Privacy for Software Applications

Program

Wednesday July 1
13:30 - 15:00
Location: H205
Session Chair: Chang Guo, Peking University, China
  • Case Base for Secure Software Development Using Software Security Knowledge Base
    Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo
  • UserRank: A User Influence-based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System
    Chang Guo, Qingni Shen, Yahui Yang, Zhonghai Wu
  • Privacy Assurance in Data-aggretation for Multiple MAX Transactions
    Kim Le, Parmesh Ramanathan, Kewal Saluja
  • Health Capital Depreciation and Medical Care Demand: An Empirical Study of Taiwan’s Senior Citizens
    Jwu Rong Lin, Ching-Yu Chen, Shuo-Chun Weng
     

STPSA will bring together researchers from both academia and industry to discuss methods and tools to achieve security, trust, and privacy (STP) goals of both traditional and emerging web-based and mobile software applications. The workshop will focus on techniques, experiences and lessons learned with respect to the STP aspects of software and mobile application specification, design, implementation, testing, and deployment.

Our societies are becoming increasingly dependent on software applications. Software applications must be engineered with reliable protection mechanisms with respect to security, privacy, and trust (STP), while still delivering the expected value of applications to end-users. Nonetheless, the scale and severity of security attacks on different types of software applications, from web-based to mobile services, have continued to grow at an ever-increasing pace. Potential consequences of a compromised software applications have also become more and more serious as many high-profile attacks are reportedly targeting software applications used in industrial control systems at nuclear power plants, in implanted heart defibrillators, and in military satellites. This situation has been worsened by recent technological developments, including pervasive computing, mobile devices, web applications and cloud computing, which have made the distrusted Internet an integral component of software applications. The traditional approaches to securing a software application (e.g., anti-virus) alone are no longer sufficient to address the STP issues of such emerging software applications. The STP issues must be addressed throughout the lifecycle of a software application, including its design, implementation, testing, and deployment. The principal obstacle in developing STP-aware software is the lack of consideration, methods, and tools for addressing STP issues under current approaches to software applications development.

Topics of interest include, but are not limited to, the following:

  • Security, trust, and privacy (STP) challenges and solutions in Web-based applications
  • Security, trust, and privacy (STP) challenges and solutions in mobile applications
  • STP challenges and solutions in cloud computing applications
  • STP challenges and solutions in pervasive software applications
  • STP challenges and solutions in mobile software applications
  • STP challenges and solutions in e-services, e.g. e-health, e-government, e-banking, etc.
  • STP challenges and solutions in distributed or sensor-based software applications
  • STP specific software development practices
  • STP requirements elicitation and specification
  • Models and languages for STP-aware software specification and design
  • Architecture for STP-aware software development
  • Testing STP properties of software applications
  • Testing STP properties of web based applications
  • STP management and usability issues in software applications
  • User interfaces for STP-aware software applications
  • Software reengineering for STP-aware software applications
  • Tradeoffs among security, privacy, trust, and other criteria
  • STP-aware service discovery mechanisms for pervasive computing environments
  • Teaching STP-aware software development
  • Experience reports on developing STP-aware software

 

Authors are invited to submit original, unpublished research papers as well as industrial practice papers. Simultaneous submissions to other publications and conferences are not permitted.

The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts.

Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.

 Announcements

Signichat conference mobile app is now available!

    

Signichat is also sponsoring a best presentation award. Authors can enter their presentation for consideration. Attendees can vote for best presentation. 

The COMPSAC 2015 Survey has been posted to the Social Events page.

Hotel information has been posted to the Travel and Venue page.

The link for registration has been posted to the Registration page.
 

Important Dates


PC Meeting: March 13-14, 2015 - Shanghai, China

COMPSAC 2015 Deadlines
April 28, 2015: Updated: April 30 - Camera-ready copy and registration due

Workshop & Tutorial Deadlines
April 10, 2015 Extended: April 15, 2015: Updated: April 24 - Workshop paper notifications
April 24, 2015 Updated: April 30 Updated: May 8 - Camera-ready copy and registration due

Fast Abstracts, Posters Deadlines
April 24, 2015: Poster/paper notification
Updated: April 30 Updated: May 8 - Camera-ready copy & registration due

Student Research Symposium/Competition Deadlines
April 16th, 2015: Updated: April 26, 2015: Notifications
April 28, 2015:Updated: April 30 Updated: May 8 - Camera-ready submissions due