<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://asset.nr.no/index.php?action=history&amp;feed=atom&amp;title=MeSSa2016</id>
		<title>MeSSa2016 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://asset.nr.no/index.php?action=history&amp;feed=atom&amp;title=MeSSa2016"/>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;action=history"/>
		<updated>2026-05-19T20:44:06Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.5</generator>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=556&amp;oldid=prev</id>
		<title>Abie at 08:24, 1 April 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=556&amp;oldid=prev"/>
				<updated>2016-04-01T08:24:49Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 08:24, 1 April 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;on &lt;/del&gt;on Monitoring and Measurability of Software and Network Security&amp;lt;br/&amp;gt;[http://www.vtt.fi/messa2016 http://www.vtt.fi/messa2016]&amp;lt;br/&amp;gt; Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Monitoring and Measurability of Software and Network Security&amp;lt;br/&amp;gt;[http://www.vtt.fi/messa2016 http://www.vtt.fi/messa2016]&amp;lt;br/&amp;gt; Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time our society is increasingly relying on cyber-physical systems. Systematic approaches to monitor and measure security are needed to build secure systems, including IoT and cloud services, and to offer security evidence for system designers and users. Security analysis and measuring on software architecture level produces evidence of security in the design phase, to deal with requirement trade-offs. Architecture-level security analysis supports &amp;quot;security by design&amp;quot;. On the other hand, to understand overall security status and get a holistic view, architecture-level security analysis has to be extended to the operational system domain, and needs to include also the network level security monitoring and analysis. Thus, techniques to understand and scale the needs in both measurement and analytics are needed. Together these are able to provide the basis for security situational awareness in the modern complex software infrastructure. Security metrics may also support security adaptation and architecture-based evolution.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time our society is increasingly relying on cyber-physical systems. Systematic approaches to monitor and measure security are needed to build secure systems, including IoT and cloud services, and to offer security evidence for system designers and users. Security analysis and measuring on software architecture level produces evidence of security in the design phase, to deal with requirement trade-offs. Architecture-level security analysis supports &amp;quot;security by design&amp;quot;. On the other hand, to understand overall security status and get a holistic view, architecture-level security analysis has to be extended to the operational system domain, and needs to include also the network level security monitoring and analysis. Thus, techniques to understand and scale the needs in both measurement and analytics are needed. Together these are able to provide the basis for security situational awareness in the modern complex software infrastructure. Security metrics may also support security adaptation and architecture-based evolution.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=555&amp;oldid=prev</id>
		<title>Abie at 08:24, 1 April 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=555&amp;oldid=prev"/>
				<updated>2016-04-01T08:24:26Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 08:24, 1 April 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;in Software Architectures&lt;/del&gt;&amp;lt;br/&amp;gt;[http://www.vtt.fi/messa2016 http://www.vtt.fi/messa2016]&amp;lt;br/&amp;gt; Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;on Monitoring and &lt;/ins&gt;Measurability of &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Software and Network &lt;/ins&gt;Security&amp;lt;br/&amp;gt;[http://www.vtt.fi/messa2016 http://www.vtt.fi/messa2016]&amp;lt;br/&amp;gt; Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time our society is increasingly relying on cyber-physical systems. Systematic approaches to monitor and measure security are needed to build secure systems, including IoT and cloud services, and to offer security evidence for system designers and users. Security analysis and measuring on software architecture level produces evidence of security in the design phase, to deal with requirement trade-offs. Architecture-level security analysis supports &amp;quot;security by design&amp;quot;. On the other hand, to understand overall security status and get a holistic view, architecture-level security analysis has to be extended to the operational system domain, and needs to include also the network level security monitoring and analysis. Thus, techniques to understand and scale the needs in both measurement and analytics are needed. Together these are able to provide the basis for security situational awareness in the modern complex software infrastructure. Security metrics may also support security adaptation and architecture-based evolution.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time our society is increasingly relying on cyber-physical systems. Systematic approaches to monitor and measure security are needed to build secure systems, including IoT and cloud services, and to offer security evidence for system designers and users. Security analysis and measuring on software architecture level produces evidence of security in the design phase, to deal with requirement trade-offs. Architecture-level security analysis supports &amp;quot;security by design&amp;quot;. On the other hand, to understand overall security status and get a holistic view, architecture-level security analysis has to be extended to the operational system domain, and needs to include also the network level security monitoring and analysis. Thus, techniques to understand and scale the needs in both measurement and analytics are needed. Together these are able to provide the basis for security situational awareness in the modern complex software infrastructure. Security metrics may also support security adaptation and architecture-based evolution.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=554&amp;oldid=prev</id>
		<title>Abie at 10:56, 30 March 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=554&amp;oldid=prev"/>
				<updated>2016-03-30T10:56:41Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 10:56, 30 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security in Software Architectures&amp;lt;br/&amp;gt;[www.vtt.fi/messa2016 www.vtt.fi/messa2016]&amp;lt;br/&amp;gt; Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security in Software Architectures&amp;lt;br/&amp;gt;[&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;http://&lt;/ins&gt;www.vtt.fi/messa2016 &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;http://&lt;/ins&gt;www.vtt.fi/messa2016]&amp;lt;br/&amp;gt; Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time our society is increasingly relying on cyber-physical systems. Systematic approaches to monitor and measure security are needed to build secure systems, including IoT and cloud services, and to offer security evidence for system designers and users. Security analysis and measuring on software architecture level produces evidence of security in the design phase, to deal with requirement trade-offs. Architecture-level security analysis supports &amp;quot;security by design&amp;quot;. On the other hand, to understand overall security status and get a holistic view, architecture-level security analysis has to be extended to the operational system domain, and needs to include also the network level security monitoring and analysis. Thus, techniques to understand and scale the needs in both measurement and analytics are needed. Together these are able to provide the basis for security situational awareness in the modern complex software infrastructure. Security metrics may also support security adaptation and architecture-based evolution.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time our society is increasingly relying on cyber-physical systems. Systematic approaches to monitor and measure security are needed to build secure systems, including IoT and cloud services, and to offer security evidence for system designers and users. Security analysis and measuring on software architecture level produces evidence of security in the design phase, to deal with requirement trade-offs. Architecture-level security analysis supports &amp;quot;security by design&amp;quot;. On the other hand, to understand overall security status and get a holistic view, architecture-level security analysis has to be extended to the operational system domain, and needs to include also the network level security monitoring and analysis. Thus, techniques to understand and scale the needs in both measurement and analytics are needed. Together these are able to provide the basis for security situational awareness in the modern complex software infrastructure. Security metrics may also support security adaptation and architecture-based evolution.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=553&amp;oldid=prev</id>
		<title>Abie at 10:56, 30 March 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=553&amp;oldid=prev"/>
				<updated>2016-03-30T10:56:06Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 10:56, 30 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security in Software Architectures&amp;lt;br/&amp;gt;[&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http://&lt;/del&gt;www.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;vttresearch&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;com/media/events&lt;/del&gt;/messa2016&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;-workshop-on-monitoring-and-measurability-of-software-and-network-security http://&lt;/del&gt;www.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;vttresearch&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;com/media/events&lt;/del&gt;/messa2016&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;-workshop-on-monitoring-and-measurability-of-software-and-network-security&lt;/del&gt;]&amp;lt;br/&amp;gt;Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security in Software Architectures&amp;lt;br/&amp;gt;[www.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;vtt&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;fi&lt;/ins&gt;/messa2016 www.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;vtt&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;fi&lt;/ins&gt;/messa2016]&amp;lt;br/&amp;gt; Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time our society is increasingly relying on cyber-physical systems. Systematic approaches to monitor and measure security are needed to build secure systems, including IoT and cloud services, and to offer security evidence for system designers and users. Security analysis and measuring on software architecture level produces evidence of security in the design phase, to deal with requirement trade-offs. Architecture-level security analysis supports &amp;quot;security by design&amp;quot;. On the other hand, to understand overall security status and get a holistic view, architecture-level security analysis has to be extended to the operational system domain, and needs to include also the network level security monitoring and analysis. Thus, techniques to understand and scale the needs in both measurement and analytics are needed. Together these are able to provide the basis for security situational awareness in the modern complex software infrastructure. Security metrics may also support security adaptation and architecture-based evolution.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time our society is increasingly relying on cyber-physical systems. Systematic approaches to monitor and measure security are needed to build secure systems, including IoT and cloud services, and to offer security evidence for system designers and users. Security analysis and measuring on software architecture level produces evidence of security in the design phase, to deal with requirement trade-offs. Architecture-level security analysis supports &amp;quot;security by design&amp;quot;. On the other hand, to understand overall security status and get a holistic view, architecture-level security analysis has to be extended to the operational system domain, and needs to include also the network level security monitoring and analysis. Thus, techniques to understand and scale the needs in both measurement and analytics are needed. Together these are able to provide the basis for security situational awareness in the modern complex software infrastructure. Security metrics may also support security adaptation and architecture-based evolution.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=550&amp;oldid=prev</id>
		<title>Abie at 07:41, 18 March 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=550&amp;oldid=prev"/>
				<updated>2016-03-18T07:41:11Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 07:41, 18 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security in Software Architectures&amp;lt;br/&amp;gt;[http://www.vttresearch.com/media/events/messa2016-workshop-on-monitoring-and-measurability-of-software-and-network-security http://www.vttresearch.com/media/events/messa2016-workshop-on-monitoring-and-measurability-of-software-and-network-security]&amp;lt;br/&amp;gt;Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security in Software Architectures&amp;lt;br/&amp;gt;[http://www.vttresearch.com/media/events/messa2016-workshop-on-monitoring-and-measurability-of-software-and-network-security http://www.vttresearch.com/media/events/messa2016-workshop-on-monitoring-and-measurability-of-software-and-network-security]&amp;lt;br/&amp;gt;Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the &lt;/del&gt;society is &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;based more and more &lt;/del&gt;on &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;reliability of &lt;/del&gt;cyber-physical systems. Systematic approaches to measure security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;and to build security in &lt;/del&gt;are &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;thus &lt;/del&gt;needed &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;in order &lt;/del&gt;to build secure &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;software &lt;/del&gt;systems and to offer security evidence for &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;software architects, decision makers &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;end-&lt;/del&gt;users. Security measuring &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;from &lt;/del&gt;software &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;architectures is required to produce sufficient &lt;/del&gt;evidence of security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;level as early as &lt;/del&gt;in the design phase. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Consequently, design&lt;/del&gt;-&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;time &lt;/del&gt;security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;measuring &lt;/del&gt;supports &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;“security &lt;/del&gt;by &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;design” approach&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;In addition&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;software architectures have &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;support runtime &lt;/del&gt;security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;measuring &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;obtain up-&lt;/del&gt;to&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;-date &lt;/del&gt;security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;information from online software systems&lt;/del&gt;. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Runtime security measuring is exploited &lt;/del&gt;in &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;situation-awareness &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;self-adaptive &lt;/del&gt;security&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, such as security of IoT &lt;/del&gt;in &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;eHealth&lt;/del&gt;. Security metrics &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;for adaptation should &lt;/del&gt;also support &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;evaluation and validation of runtime &lt;/del&gt;security adaptation&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;applicable measuring techniques for design&lt;/del&gt;-&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;time and runtime security monitoring&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;our &lt;/ins&gt;society is &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;increasingly relying &lt;/ins&gt;on cyber-physical systems. Systematic approaches to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;monitor and &lt;/ins&gt;measure security are needed to build secure systems&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, including IoT and cloud services, &lt;/ins&gt;and to offer security evidence for &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;system designers &lt;/ins&gt;and users. Security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;analysis and &lt;/ins&gt;measuring &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;on &lt;/ins&gt;software &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;architecture level produces &lt;/ins&gt;evidence of security in the design phase&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, to deal with requirement trade-offs&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Architecture&lt;/ins&gt;-&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;level &lt;/ins&gt;security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;analysis &lt;/ins&gt;supports &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;quot;security &lt;/ins&gt;by &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;design&amp;quot;&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;On the other hand&lt;/ins&gt;, to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;understand overall security status and get a holistic view, architecture-level &lt;/ins&gt;security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;analysis has to be extended &lt;/ins&gt;to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;the operational system domain, and needs &lt;/ins&gt;to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;include also the network level &lt;/ins&gt;security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;monitoring and analysis&lt;/ins&gt;. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Thus, techniques to understand and scale the needs &lt;/ins&gt;in &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;both measurement &lt;/ins&gt;and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;analytics are needed. Together these are able to provide the basis for &lt;/ins&gt;security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;situational awareness &lt;/ins&gt;in &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;the modern complex software infrastructure&lt;/ins&gt;. Security metrics &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;may &lt;/ins&gt;also support security adaptation and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;architecture&lt;/ins&gt;-&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;based evolution&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;The workshop will provide a forum for dissemination, demonstration and discussion of original scientific and experimental results of security measurement topics. &lt;/del&gt;MeSSa 2016 solicits contributions on the following issues (but not limited to):&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;MeSSa 2016 solicits &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;security-enhancing &lt;/ins&gt;contributions on the following issues (but not limited to):&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Security, trust and privacy metrics&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Security, trust and privacy metrics&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Security assurance metrics&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Measurement systems and architectures&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Security, trust &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;privacy measurement systems and associated data gathering&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* Securing Internet of Things&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Security measuring from software architectures &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;measurability-increasing mechanisms&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* Trusted cloud&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Metrics for self&lt;/del&gt;-adaptive &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;security&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Situational awareness &lt;/ins&gt;and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;threat intelligence&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;*Taxonomies &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;ontologies on &lt;/del&gt;security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;metrics&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Software Defined Networking &lt;/ins&gt;and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Network Function Virtualisation&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Trade-off analysis and decision-making&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Self&lt;/ins&gt;-adaptive and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;cognitive &lt;/ins&gt;security&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;*Adaptive metrics approach for measuring risks, threats, operational activities, and the effectiveness of data protection&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Trade-off analysis and decision-making&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;*Metrics for evaluation and validation of security adaptation&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Evolutionary techniques&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Evolutionary techniques &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;for developing adaptive security metrics&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Measuring at runtime&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Adaptive metric for measuring security level of a real-time system&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Security visualisation and analytics&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Visualizing security metrics&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Quality &lt;/ins&gt;and uncertainty in security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;measurement and metrics&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Methods for analyzing sensitivity &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;assessing &lt;/del&gt;uncertainty in &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;adaptive &lt;/del&gt;security&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Anomaly detection&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Techniques for integrating &lt;/del&gt;data analytics &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;to support security decision-making and adaptive control&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* Forensics and &lt;/ins&gt;data analytics&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Optimization &lt;/del&gt;and security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;challenges in IoT-based architectures for eHealth&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Taxonomies &lt;/ins&gt;and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ontologies on &lt;/ins&gt;security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;metrics&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Cognitive security capabilities of IoT-based architectures for eHealth&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Empirical case studies &lt;/ins&gt;and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;pilots&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;*Evaluation of adaptive security &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;privacy solutions&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Risk&lt;/ins&gt;-based security &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;measurement &lt;/ins&gt;and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;analysis&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Real-time anomaly detection in communication networks&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Adaptive metrics and multi&lt;/ins&gt;-&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;metrics&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;*Innovative visualization methods for detection of attacks in networks&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Semantic provability&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;*Security functionality in network management systems to assist administrators/operators&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;*SDN&lt;/del&gt;-based &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;methods for &lt;/del&gt;security &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;monitoring &lt;/del&gt;and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;assurance&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Security issues of SDN&lt;/del&gt;-&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;based network control software&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Security assurance for third party control applications in SDN&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT DATES&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of papers:&amp;#039;&amp;#039;&amp;#039;May 22, 2016&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Author notification: &amp;#039;&amp;#039;&amp;#039;June 19, 2016&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of camera-ready paper: &amp;#039;&amp;#039;&amp;#039;June 27, 2016&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT DATES&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of papers:&amp;#039;&amp;#039;&amp;#039;May 22, 2016&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Author notification: &amp;#039;&amp;#039;&amp;#039;June 19, 2016&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of camera-ready paper: &amp;#039;&amp;#039;&amp;#039;June 27, 2016&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=549&amp;oldid=prev</id>
		<title>Abie at 07:35, 18 March 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=549&amp;oldid=prev"/>
				<updated>2016-03-18T07:35:11Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 07:35, 18 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security in Software Architectures&amp;lt;br/&amp;gt;[http://www.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;vtt&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;fi&lt;/del&gt;/messa2016 http://www.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;vtt&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;fi&lt;/del&gt;/messa2016]&amp;lt;br/&amp;gt;Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;p style=&amp;quot;text-align: center&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size:large&amp;quot;&amp;gt;CALL FOR PAPERS&amp;lt;br/&amp;gt;MeSSa 2016&amp;lt;br/&amp;gt;3rd International Workshop on Measurability of Security in Software Architectures&amp;lt;br/&amp;gt;[http://www.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;vttresearch&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;com/media/events&lt;/ins&gt;/messa2016&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;-workshop-on-monitoring-and-measurability-of-software-and-network-security &lt;/ins&gt;http://www.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;vttresearch&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;com/media/events&lt;/ins&gt;/messa2016&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;-workshop-on-monitoring-and-measurability-of-software-and-network-security&lt;/ins&gt;]&amp;lt;br/&amp;gt;Istanbul, Turkey, September 5-9, 2016&amp;lt;br/&amp;gt;Co-located with&amp;lt;br/&amp;gt;The 10th European Conference on Software Architecture (ECSA 2016)&amp;lt;br/&amp;gt;[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]&amp;lt;/span&amp;gt;&amp;lt;/p&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=544&amp;oldid=prev</id>
		<title>Abie at 08:59, 3 March 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=544&amp;oldid=prev"/>
				<updated>2016-03-03T08:59:48Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 08:59, 3 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l43&quot; &gt;Line 43:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 43:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;PROGRAM COMMITTEE&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;PROGRAM COMMITTEE&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Noureddine Boudriga, University of Carthage, Tunisia&amp;lt;br/&amp;gt;Iris Adam, NOKIA Networks, Germany&amp;lt;br/&amp;gt;Thorsten Holz, Ruhr-Universität Bochum, Germany&amp;lt;br/&amp;gt;Wolfgang Hommel, Leibniz Supercomputing Centre, Germany&amp;lt;br/&amp;gt;Marina Krotofil, Hamburg University of Technology, Germany&amp;lt;br/&amp;gt;Wolfgang Leister, Norwegian Computing Center, Norway&amp;lt;br/&amp;gt;Fabio Martinelli, Institute of Informatics and Telematics, Italy&amp;lt;br/&amp;gt;Mohammad Mozumdar, California State University, Long Beach, USA&amp;lt;br/&amp;gt;Eila Ovaska, VTT Technical Research Centre of Finland, Finland&amp;lt;br/&amp;gt;Ebenezer Paintsil, Verifone, Norway&amp;lt;br/&amp;gt;Stefan Poslad, Queen Mary University of London, UK&amp;lt;br/&amp;gt;Juha Röning, University of Oulu, Finland&amp;lt;br/&amp;gt;Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium&amp;lt;br/&amp;gt;Einar Snekkenes, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Gjøvik &lt;/del&gt;University &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;College&lt;/del&gt;, Norway&amp;lt;br/&amp;gt;Denis Treck, University of Ljubljana, Slovenia&amp;lt;br/&amp;gt;Yan Zhang, Simula Research Laboratory, Norway&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Noureddine Boudriga, University of Carthage, Tunisia&amp;lt;br/&amp;gt;Iris Adam, NOKIA Networks, Germany&amp;lt;br/&amp;gt;Thorsten Holz, Ruhr-Universität Bochum, Germany&amp;lt;br/&amp;gt;Wolfgang Hommel, Leibniz Supercomputing Centre, Germany&amp;lt;br/&amp;gt;Marina Krotofil, Hamburg University of Technology, Germany&amp;lt;br/&amp;gt;Wolfgang Leister, Norwegian Computing Center, Norway&amp;lt;br/&amp;gt;Fabio Martinelli, Institute of Informatics and Telematics, Italy&amp;lt;br/&amp;gt;Mohammad Mozumdar, California State University, Long Beach, USA&amp;lt;br/&amp;gt;Eila Ovaska, VTT Technical Research Centre of Finland, Finland&amp;lt;br/&amp;gt;Ebenezer Paintsil, Verifone, Norway&amp;lt;br/&amp;gt;Stefan Poslad, Queen Mary University of London, UK&amp;lt;br/&amp;gt;Juha Röning, University of Oulu, Finland&amp;lt;br/&amp;gt;Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium&amp;lt;br/&amp;gt;Einar Snekkenes, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Norwegian &lt;/ins&gt;University &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;of Science and Technology&lt;/ins&gt;, Norway&amp;lt;br/&amp;gt;Denis Treck, University of Ljubljana, Slovenia&amp;lt;br/&amp;gt;Yan Zhang, Simula Research Laboratory, Norway&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;ORGANISING PROJECTS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;IoTSec (iotsec.no)&amp;lt;br/&amp;gt;SENDATE Celtic-Plus Flagship&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;ORGANISING PROJECTS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;IoTSec (iotsec.no)&amp;lt;br/&amp;gt;SENDATE Celtic-Plus Flagship&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=543&amp;oldid=prev</id>
		<title>Abie at 08:55, 3 March 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=543&amp;oldid=prev"/>
				<updated>2016-03-03T08:55:38Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 08:55, 3 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l29&quot; &gt;Line 29:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 29:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Security assurance for third party control applications in SDN&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Security assurance for third party control applications in SDN&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT DATES&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of papers:&amp;#039;&amp;#039;&amp;#039;May 22, 2016&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Author notification: &amp;#039;&amp;#039;&amp;#039;June 19, 2016&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of camera-ready paper: &amp;#039;&amp;#039;&amp;#039;June 27, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;2015&lt;/del&gt;&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT DATES&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of papers:&amp;#039;&amp;#039;&amp;#039;May 22, 2016&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Author notification: &amp;#039;&amp;#039;&amp;#039;June 19, 2016&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of camera-ready paper: &amp;#039;&amp;#039;&amp;#039;June 27, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;2016&lt;/ins&gt;&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;SUBMISSION AND PUBLICATION&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template ([http://www.acm.org/sigs/publications/proceedings-templates http://www.acm.org/sigs/publications/proceedings-templates]) for the paper.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;SUBMISSION AND PUBLICATION&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template ([http://www.acm.org/sigs/publications/proceedings-templates http://www.acm.org/sigs/publications/proceedings-templates]) for the paper.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=542&amp;oldid=prev</id>
		<title>Abie at 08:50, 3 March 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=542&amp;oldid=prev"/>
				<updated>2016-03-03T08:50:58Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 08:50, 3 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l37&quot; &gt;Line 37:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The accepted workshop papers will be published in an ACM digital library. At least one author of all accepted papers must present the paper at the workshop.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The accepted workshop papers will be published in an ACM digital library. At least one author of all accepted papers must present the paper at the workshop.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;ORGANIZERS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Reijo Savola, VTT Technical Research Centre of Finland, Finland&amp;lt;br/&amp;gt;Habtamu Abie, Norwegian Computing Centre, Norway&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Antti Evesti, VTT Technical Research Centre of Finland, Finland&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;#039;&amp;#039;&amp;#039;ORGANIZERS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Reijo Savola, VTT Technical Research Centre of Finland, Finland&amp;lt;br/&amp;gt;Habtamu Abie, Norwegian Computing Centre, Norway&amp;lt;br/&amp;gt;&lt;/ins&gt;Antti Evesti, VTT Technical Research Centre of Finland, Finland&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;PROGRAM COMMITTEE&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;PROGRAM COMMITTEE&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Iris Adam, NOKIA Networks, Germany&amp;lt;br/&amp;gt;Thorsten Holz, Ruhr-Universität Bochum, Germany&amp;lt;br/&amp;gt;Wolfgang Hommel, Leibniz Supercomputing Centre, Germany&amp;lt;br/&amp;gt;Marina Krotofil, Hamburg University of Technology, Germany&amp;lt;br/&amp;gt;Wolfgang Leister, Norwegian Computing Center, Norway&amp;lt;br/&amp;gt;Fabio Martinelli, Institute of Informatics and Telematics, Italy&amp;lt;br/&amp;gt;Mohammad Mozumdar, California State University, Long Beach, USA&amp;lt;br/&amp;gt;Eila Ovaska, VTT Technical Research Centre of Finland, Finland&amp;lt;br/&amp;gt;Ebenezer Paintsil, Verifone, Norway&amp;lt;br/&amp;gt;Stefan Poslad, Queen Mary University of London, UK&amp;lt;br/&amp;gt;Juha Röning, University of Oulu, Finland&amp;lt;br/&amp;gt;Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium&amp;lt;br/&amp;gt;Einar Snekkenes, Gjøvik University College, Norway&amp;lt;br/&amp;gt;Denis Treck, University of Ljubljana, Slovenia&amp;lt;br/&amp;gt;Yan Zhang, Simula Research Laboratory, Norway&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Noureddine Boudriga, University of Carthage, Tunisia&amp;lt;br/&amp;gt;&lt;/ins&gt;Iris Adam, NOKIA Networks, Germany&amp;lt;br/&amp;gt;Thorsten Holz, Ruhr-Universität Bochum, Germany&amp;lt;br/&amp;gt;Wolfgang Hommel, Leibniz Supercomputing Centre, Germany&amp;lt;br/&amp;gt;Marina Krotofil, Hamburg University of Technology, Germany&amp;lt;br/&amp;gt;Wolfgang Leister, Norwegian Computing Center, Norway&amp;lt;br/&amp;gt;Fabio Martinelli, Institute of Informatics and Telematics, Italy&amp;lt;br/&amp;gt;Mohammad Mozumdar, California State University, Long Beach, USA&amp;lt;br/&amp;gt;Eila Ovaska, VTT Technical Research Centre of Finland, Finland&amp;lt;br/&amp;gt;Ebenezer Paintsil, Verifone, Norway&amp;lt;br/&amp;gt;Stefan Poslad, Queen Mary University of London, UK&amp;lt;br/&amp;gt;Juha Röning, University of Oulu, Finland&amp;lt;br/&amp;gt;Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium&amp;lt;br/&amp;gt;Einar Snekkenes, Gjøvik University College, Norway&amp;lt;br/&amp;gt;Denis Treck, University of Ljubljana, Slovenia&amp;lt;br/&amp;gt;Yan Zhang, Simula Research Laboratory, Norway&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;ORGANISING PROJECTS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;IoTSec (iotsec.no)&amp;lt;br/&amp;gt;SENDATE Celtic-Plus Flagship&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;ORGANISING PROJECTS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;IoTSec (iotsec.no)&amp;lt;br/&amp;gt;SENDATE Celtic-Plus Flagship&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	<entry>
		<id>http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=541&amp;oldid=prev</id>
		<title>Abie at 08:45, 3 March 2016</title>
		<link rel="alternate" type="text/html" href="http://asset.nr.no/index.php?title=MeSSa2016&amp;diff=541&amp;oldid=prev"/>
				<updated>2016-03-03T08:45:22Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;col class=&#039;diff-marker&#039; /&gt;
				&lt;col class=&#039;diff-content&#039; /&gt;
				&lt;tr style=&#039;vertical-align: top;&#039; lang=&#039;en&#039;&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&#039;2&#039; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 08:45, 3 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l3&quot; &gt;Line 3:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;TOPICS&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The workshop will provide a forum for dissemination, demonstration and discussion of original scientific and experimental results of security measurement topics. MeSSa &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;2015 &lt;/del&gt;solicits contributions on the following issues (but not limited to):&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The workshop will provide a forum for dissemination, demonstration and discussion of original scientific and experimental results of security measurement topics. MeSSa &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;2016 &lt;/ins&gt;solicits contributions on the following issues (but not limited to):&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Security, trust and privacy metrics&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Security, trust and privacy metrics&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l29&quot; &gt;Line 29:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 29:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Security assurance for third party control applications in SDN&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Security assurance for third party control applications in SDN&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT DATES&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of papers:&amp;#039;&amp;#039;&amp;#039;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;June 7&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;2015&lt;/del&gt;&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Author notification: &amp;#039;&amp;#039;&amp;#039;June 19, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;2015&lt;/del&gt;&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of camera-ready paper: &amp;#039;&amp;#039;&amp;#039;June &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;22&lt;/del&gt;, 2015&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT DATES&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of papers:&amp;#039;&amp;#039;&amp;#039;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;May 22&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;2016&lt;/ins&gt;&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Author notification: &amp;#039;&amp;#039;&amp;#039;June 19, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;2016&lt;/ins&gt;&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Submission of camera-ready paper: &amp;#039;&amp;#039;&amp;#039;June &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;27&lt;/ins&gt;, 2015&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;SUBMISSION AND PUBLICATION&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template ([http://www.acm.org/sigs/publications/proceedings-templates http://www.acm.org/sigs/publications/proceedings-templates]) for the paper.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br/&amp;gt;&amp;#039;&amp;#039;&amp;#039;SUBMISSION AND PUBLICATION&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template ([http://www.acm.org/sigs/publications/proceedings-templates http://www.acm.org/sigs/publications/proceedings-templates]) for the paper.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Abie</name></author>	</entry>

	</feed>