Difference between revisions of "MeSSa2016"

From Asset
Jump to: navigation, search
Line 1: Line 1:
----
+
<parsererror>XML Parsing Error: not well-formed Location: http://asset.nr.no/asset/index.php?title=MeSSa2016&action=edit Line Number 1, Column 11925:<sourcetext>&lt;body xmlns:x="http://excel"&gt;&lt;hr/&gt;&lt;p style="text-align: center"&gt;&lt;span style="font-size:large"&gt;CALL FOR PAPERS&lt;br/&gt;MeSSa 2016&lt;br/&gt;3rd International Workshop on Measurability of Security in Software Architectures&lt;br/&gt;&lt;a href="http://www.vtt.fi/messa2016"&gt;http://www.vtt.fi/messa2016&lt;/a&gt;&lt;br/&gt;Istanbul, Turkey, September 5-9, 2016&lt;br/&gt;Co-located with&lt;br/&gt;The 10th European Conference on Software Architecture (ECSA 2016)&lt;br/&gt;&lt;a href="http://ecsa2016.iku.edu.tr/#workshops/"&gt;http://ecsa2016.iku.edu.tr/#workshops/&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;TOPICS&lt;/b&gt;&lt;br/&gt;Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.&lt;/p&gt;&lt;p&gt;The workshop will provide a forum for dissemination, demonstration and discussion of original scientific and experimental results of security measurement topics. MeSSa 2015 solicits contributions on the following issues (but not limited to):&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Security, trust and privacy metrics&lt;/li&gt;&lt;li&gt;Security assurance metrics&lt;/li&gt;&lt;li&gt;Security, trust and privacy measurement systems and associated data gathering&lt;/li&gt;&lt;li&gt;Security measuring from software architectures and measurability-increasing mechanisms&lt;/li&gt;&lt;li&gt;Metrics for self-adaptive security&lt;/li&gt;&lt;li&gt;Taxonomies and ontologies on security metrics&lt;/li&gt;&lt;li&gt;Trade-off analysis and decision-making&lt;/li&gt;&lt;li&gt;Adaptive metrics approach for measuring risks, threats, operational activities, and the effectiveness of data protection&lt;/li&gt;&lt;li&gt;Metrics for evaluation and validation of security adaptation&lt;/li&gt;&lt;li&gt;Evolutionary techniques for developing adaptive security metrics&lt;/li&gt;&lt;li&gt;Adaptive metric for measuring security level of a real-time system&lt;/li&gt;&lt;li&gt;Visualizing security metrics&lt;/li&gt;&lt;li&gt;Methods for analyzing sensitivity and assessing uncertainty in adaptive security&lt;/li&gt;&lt;li&gt;Techniques for integrating data analytics to support security decision-making and adaptive control&lt;/li&gt;&lt;li&gt;Optimization and security challenges in IoT-based architectures for eHealth&lt;/li&gt;&lt;li&gt;Cognitive security capabilities of IoT-based architectures for eHealth&lt;/li&gt;&lt;li&gt;Evaluation of adaptive security and privacy solutions&lt;/li&gt;&lt;li&gt;Real-time anomaly detection in communication networks&lt;/li&gt;&lt;li&gt;Innovative visualization methods for detection of attacks in networks&lt;/li&gt;&lt;li&gt;Security functionality in network management systems to assist administrators/operators&lt;/li&gt;&lt;li&gt;SDN-based methods for security monitoring and assurance&lt;/li&gt;&lt;li&gt;Security issues of SDN-based network control software&lt;/li&gt;&lt;li&gt;Security assurance for third party control applications in SDN&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br/&gt;&lt;b&gt;IMPORTANT DATES&lt;/b&gt;&lt;br/&gt;Submission of papers: &lt;b&gt;&lt;strike&gt;May 22&lt;/strike&gt;, June 7, 2015&lt;/b&gt;&lt;br/&gt;Author notification: &lt;b&gt;June 19, 2015&lt;/b&gt;&lt;br/&gt;Submission of camera-ready paper: &lt;b&gt;June 22, 2015&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;b&gt;SUBMISSION AND PUBLICATION&lt;/b&gt;&lt;br/&gt;Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template (&lt;a href="http://www.acm.org/sigs/publications/proceedings-templates"&gt;http://www.acm.org/sigs/publications/proceedings-templates&lt;/a&gt;) for the paper.&lt;/p&gt;&lt;p&gt;The paper should be supplied in MS Word or PDF format to &lt;a href="https://easychair.org/conferences/?conf=messa2015"&gt;https://easychair.org/conferences/?conf=messa2015&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The accepted workshop papers will be published in an ACM digital library. At least one author of all accepted papers must present the paper at the workshop.&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;b&gt;ORGANIZERS&lt;/b&gt;&lt;br/&gt;Reijo Savola, VTT Technical Research Centre of Finland, Finland&lt;br/&gt;Antti Evesti, VTT Technical Research Centre of Finland, Finland&lt;br/&gt;Anni Karinsalo, VTT Technical Research Centre of Finland, Finland&lt;br/&gt;Marco Hoffmann, NOKIA Networks, Germany&lt;br/&gt;Habtamu Abie, Norwegian Computing Centre, Norway&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;b&gt;PROGRAM COMMITTEE&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Iris Adam, NOKIA Networks, Germany&lt;br/&gt;Thorsten Holz, Ruhr-Universität Bochum, Germany&lt;br/&gt;Wolfgang Hommel, Leibniz Supercomputing Centre, Germany&lt;br/&gt;Marina Krotofil, Hamburg University of Technology, Germany&lt;br/&gt;Wolfgang Leister, Norwegian Computing Center, Norway&lt;br/&gt;Fabio Martinelli, Institute of Informatics and Telematics, Italy&lt;br/&gt;Mohammad Mozumdar, California State University, Long Beach, USA&lt;br/&gt;Eila Ovaska, VTT Technical Research Centre of Finland, Finland&lt;br/&gt;Ebenezer Paintsil, Verifone, Norway&lt;br/&gt;Stefan Poslad, Queen Mary University of London, UK&lt;br/&gt;Juha Röning, University of Oulu, Finland&lt;br/&gt;Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium&lt;br/&gt;Einar Snekkenes, Gjøvik University College, Norway&lt;br/&gt;Arild Torjusen, Norwegian Computing Center, Norway&lt;br/&gt;Denis Treck, University of Ljubljana, Slovenia&lt;br/&gt;Yan Zhang, Simula Research Laboratory, Norway&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;ORGANISING PROJECTS&lt;/b&gt;&lt;br/&gt;IoTSec (iotsec.no)&lt;/p&gt;&lt;hr/&gt;&lt;p style="text-align: center"&gt;&lt;span style="font-size:large"&gt;CALL FOR PAPERS&lt;br/&gt;MeSSa 2016&lt;br/&gt;3rd International Workshop on Measurability of Security in Software Architectures&lt;br/&gt;&lt;a rel="nofollow" class="external free" href="http://www.vtt.fi/messa2016"&gt;http://www.vtt.fi/messa2016&lt;/a&gt;&lt;br/&gt;Istanbul, Turkey, September 5-9, 2016&lt;br/&gt;Co-located with&lt;br/&gt;The 10th European Conference on Software Architecture (ECSA 2016)&lt;br/&gt;&lt;a rel="nofollow" class="external free" href="http://ecsa2016.iku.edu.tr/#workshops/"&gt;http://ecsa2016.iku.edu.tr/#workshops/&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;TOPICS&lt;/b&gt;&lt;br/&gt;Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.&lt;/p&gt;&lt;p&gt;The workshop will provide a forum for dissemination, demonstration and discussion of original scientific and experimental results of security measurement topics. MeSSa 2015 solicits contributions on the following issues (but not limited to):&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Security, trust and privacy metrics&lt;/li&gt;&lt;li&gt;Security assurance metrics&lt;/li&gt;&lt;li&gt;Security, trust and privacy measurement systems and associated data gathering&lt;/li&gt;&lt;li&gt;Security measuring from software architectures and measurability-increasing mechanisms&lt;/li&gt;&lt;li&gt;Metrics for self-adaptive security&lt;/li&gt;&lt;li&gt;Taxonomies and ontologies on security metrics&lt;/li&gt;&lt;li&gt;Trade-off analysis and decision-making&lt;/li&gt;&lt;li&gt;Adaptive metrics approach for measuring risks, threats, operational activities, and the effectiveness of data protection&lt;/li&gt;&lt;li&gt;Metrics for evaluation and validation of security adaptation&lt;/li&gt;&lt;li&gt;Evolutionary techniques for developing adaptive security metrics&lt;/li&gt;&lt;li&gt;Adaptive metric for measuring security level of a real-time system&lt;/li&gt;&lt;li&gt;Visualizing security metrics&lt;/li&gt;&lt;li&gt;Methods for analyzing sensitivity and assessing uncertainty in adaptive security&lt;/li&gt;&lt;li&gt;Techniques for integrating data analytics to support security decision-making and adaptive control&lt;/li&gt;&lt;li&gt;Optimization and security challenges in IoT-based architectures for eHealth&lt;/li&gt;&lt;li&gt;Cognitive security capabilities of IoT-based architectures for eHealth&lt;/li&gt;&lt;li&gt;Evaluation of adaptive security and privacy solutions&lt;/li&gt;&lt;li&gt;Real-time anomaly detection in communication networks&lt;/li&gt;&lt;li&gt;Innovative visualization methods for detection of attacks in networks&lt;/li&gt;&lt;li&gt;Security functionality in network management systems to assist administrators/operators&lt;/li&gt;&lt;li&gt;SDN-based methods for security monitoring and assurance&lt;/li&gt;&lt;li&gt;Security issues of SDN-based network control software&lt;/li&gt;&lt;li&gt;Security assurance for third party control applications in SDN&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br/&gt;&lt;b&gt;IMPORTANT DATES&lt;/b&gt;&lt;br/&gt;Submission of papers: &lt;b&gt;&lt;strike&gt;May 22&lt;/strike&gt;, June 7, 2015&lt;/b&gt;&lt;br/&gt;Author notification: &lt;b&gt;June 19, 2015&lt;/b&gt;&lt;br/&gt;Submission of camera-ready paper: &lt;b&gt;June 22, 2015&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;b&gt;SUBMISSION AND PUBLICATION&lt;/b&gt;&lt;br/&gt;Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template (&lt;a rel="nofollow" class="external free" href="http://www.acm.org/sigs/publications/proceedings-templates"&gt;http://www.acm.org/sigs/publications/proceedings-templates&lt;/a&gt;) for the paper.&lt;/p&gt;&lt;p&gt;The paper should be supplied in MS Word or PDF format to &lt;a rel="nofollow" class="external free" href="https://easychair.org/conferences/?conf=messa2015"&gt;https://easychair.org/conferences/?conf=messa2015&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The accepted workshop papers will be published in an ACM digital library. At least one author of all accepted papers must present the paper at the workshop.&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;b&gt;ORGANIZERS&lt;/b&gt;&lt;br/&gt;Reijo Savola, VTT Technical Research Centre of Finland, Finland&lt;br/&gt;Antti Evesti, VTT Technical Research Centre of Finland, Finland&lt;br/&gt;Anni Karinsalo, VTT Technical Research Centre of Finland, Finland&lt;br/&gt;Marco Hoffmann, NOKIA Networks, Germany&lt;br/&gt;Habtamu Abie, Norwegian Computing Centre, Norway&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;b&gt;PROGRAM COMMITTEE&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Iris Adam, NOKIA Networks, Germany&lt;br/&gt;Thorsten Holz, Ruhr-Universität Bochum, Germany&lt;br/&gt;Wolfgang Hommel, Leibniz Supercomputing Centre, Germany&lt;br/&gt;Marina Krotofil, Hamburg University of Technology, Germany&lt;br/&gt;Wolfgang Leister, Norwegian Computing Center, Norway&lt;br/&gt;Fabio Martinelli, Institute of Informatics and Telematics, Italy&lt;br/&gt;Mohammad Mozumdar, California State University, Long Beach, USA&lt;br/&gt;Eila Ovaska, VTT Technical Research Centre of Finland, Finland&lt;br/&gt;Ebenezer Paintsil, Verifone, Norway&lt;br/&gt;Stefan Poslad, Queen Mary University of London, UK&lt;br/&gt;Juha Röning, University of Oulu, Finland&lt;br/&gt;Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium&lt;br/&gt;Einar Snekkenes, Gjøvik University College, Norway&lt;br/&gt;Arild Torjusen, Norwegian Computing Center, Norway&lt;br/&gt;Denis Treck, University of Ljubljana, Slovenia&lt;br/&gt;Yan Zhang, Simula Research Laboratory, Norway&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;ORGANISING PROJECTS&lt;/b&gt;&lt;br/&gt;ASSET (asset.nr.no)&lt;br/&gt;&lt;span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D" lang="EN-GB"&gt;SENDATE Celtic-Plus Flagship&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/body&gt; --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------^</sourcetext></parsererror>
<p style="text-align: center"><span style="font-size:large">CALL FOR PAPERS<br/>MeSSa 2016<br/>3rd International Workshop on Measurability of Security in Software Architectures<br/>[http://www.vtt.fi/messa2016 http://www.vtt.fi/messa2016]<br/>Istanbul, Turkey, September 5-9, 2016<br/>Co-located with<br/>The 10th European Conference on Software Architecture (ECSA 2016)<br/>[http://ecsa2016.iku.edu.tr/#workshops/ http://ecsa2016.iku.edu.tr/#workshops/]</span></p>
 
'''TOPICS'''<br/>Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.
 
 
 
The workshop will provide a forum for dissemination, demonstration and discussion of original scientific and experimental results of security measurement topics. MeSSa 2015 solicits contributions on the following issues (but not limited to):
 
 
 
*Security, trust and privacy metrics
 
*Security assurance metrics
 
*Security, trust and privacy measurement systems and associated data gathering
 
*Security measuring from software architectures and measurability-increasing mechanisms
 
*Metrics for self-adaptive security
 
*Taxonomies and ontologies on security metrics
 
*Trade-off analysis and decision-making
 
*Adaptive metrics approach for measuring risks, threats, operational activities, and the effectiveness of data protection
 
*Metrics for evaluation and validation of security adaptation
 
*Evolutionary techniques for developing adaptive security metrics
 
*Adaptive metric for measuring security level of a real-time system
 
*Visualizing security metrics
 
*Methods for analyzing sensitivity and assessing uncertainty in adaptive security
 
*Techniques for integrating data analytics to support security decision-making and adaptive control
 
*Optimization and security challenges in IoT-based architectures for eHealth
 
*Cognitive security capabilities of IoT-based architectures for eHealth
 
*Evaluation of adaptive security and privacy solutions
 
*Real-time anomaly detection in communication networks
 
*Innovative visualization methods for detection of attacks in networks
 
*Security functionality in network management systems to assist administrators/operators
 
*SDN-based methods for security monitoring and assurance
 
*Security issues of SDN-based network control software
 
*Security assurance for third party control applications in SDN
 
 
 
<br/>'''IMPORTANT DATES'''<br/>Submission of papers: '''<strike>May 22</strike>, June 7, 2015'''<br/>Author notification: '''June 19, 2015'''<br/>Submission of camera-ready paper: '''June 22, 2015'''
 
 
 
<br/>'''SUBMISSION AND PUBLICATION'''<br/>Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template ([http://www.acm.org/sigs/publications/proceedings-templates http://www.acm.org/sigs/publications/proceedings-templates]) for the paper.
 
 
 
The paper should be supplied in MS Word or PDF format to [https://easychair.org/conferences/?conf=messa2015 https://easychair.org/conferences/?conf=messa2015]
 
 
 
The accepted workshop papers will be published in an ACM digital library. At least one author of all accepted papers must present the paper at the workshop.
 
 
 
<br/>'''ORGANIZERS'''<br/>Reijo Savola, VTT Technical Research Centre of Finland, Finland<br/>Antti Evesti, VTT Technical Research Centre of Finland, Finland<br/>Anni Karinsalo, VTT Technical Research Centre of Finland, Finland<br/>Marco Hoffmann, NOKIA Networks, Germany<br/>Habtamu Abie, Norwegian Computing Centre, Norway
 
 
 
<br/>'''PROGRAM COMMITTEE'''
 
 
 
Iris Adam, NOKIA Networks, Germany<br/>Thorsten Holz, Ruhr-Universität Bochum, Germany<br/>Wolfgang Hommel, Leibniz Supercomputing Centre, Germany<br/>Marina Krotofil, Hamburg University of Technology, Germany<br/>Wolfgang Leister, Norwegian Computing Center, Norway<br/>Fabio Martinelli, Institute of Informatics and Telematics, Italy<br/>Mohammad Mozumdar, California State University, Long Beach, USA<br/>Eila Ovaska, VTT Technical Research Centre of Finland, Finland<br/>Ebenezer Paintsil, Verifone, Norway<br/>Stefan Poslad, Queen Mary University of London, UK<br/>Juha Röning, University of Oulu, Finland<br/>Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium<br/>Einar Snekkenes, Gjøvik University College, Norway<br/>Arild Torjusen, Norwegian Computing Center, Norway<br/>Denis Treck, University of Ljubljana, Slovenia<br/>Yan Zhang, Simula Research Laboratory, Norway
 
 
 
 
 
 
 
'''ORGANISING PROJECTS'''<br/>ASSET (asset.nr.no)<br/>SASER-SIEGFRIED (Celtic-Plus Project)
 

Revision as of 10:02, 18 February 2016

<parsererror>XML Parsing Error: not well-formed Location: http://asset.nr.no/asset/index.php?title=MeSSa2016&action=edit Line Number 1, Column 11925:<sourcetext><body xmlns:x="http://excel"><hr/><p style="text-align: center"><span style="font-size:large">CALL FOR PAPERS<br/>MeSSa 2016<br/>3rd International Workshop on Measurability of Security in Software Architectures<br/><a href="http://www.vtt.fi/messa2016">http://www.vtt.fi/messa2016</a><br/>Istanbul, Turkey, September 5-9, 2016<br/>Co-located with<br/>The 10th European Conference on Software Architecture (ECSA 2016)<br/><a href="http://ecsa2016.iku.edu.tr/#workshops/">http://ecsa2016.iku.edu.tr/#workshops/</a></span></p><p><b>TOPICS</b><br/>Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.</p><p>The workshop will provide a forum for dissemination, demonstration and discussion of original scientific and experimental results of security measurement topics. MeSSa 2015 solicits contributions on the following issues (but not limited to):</p><ul><li>Security, trust and privacy metrics</li><li>Security assurance metrics</li><li>Security, trust and privacy measurement systems and associated data gathering</li><li>Security measuring from software architectures and measurability-increasing mechanisms</li><li>Metrics for self-adaptive security</li><li>Taxonomies and ontologies on security metrics</li><li>Trade-off analysis and decision-making</li><li>Adaptive metrics approach for measuring risks, threats, operational activities, and the effectiveness of data protection</li><li>Metrics for evaluation and validation of security adaptation</li><li>Evolutionary techniques for developing adaptive security metrics</li><li>Adaptive metric for measuring security level of a real-time system</li><li>Visualizing security metrics</li><li>Methods for analyzing sensitivity and assessing uncertainty in adaptive security</li><li>Techniques for integrating data analytics to support security decision-making and adaptive control</li><li>Optimization and security challenges in IoT-based architectures for eHealth</li><li>Cognitive security capabilities of IoT-based architectures for eHealth</li><li>Evaluation of adaptive security and privacy solutions</li><li>Real-time anomaly detection in communication networks</li><li>Innovative visualization methods for detection of attacks in networks</li><li>Security functionality in network management systems to assist administrators/operators</li><li>SDN-based methods for security monitoring and assurance</li><li>Security issues of SDN-based network control software</li><li>Security assurance for third party control applications in SDN</li></ul><p><br/><b>IMPORTANT DATES</b><br/>Submission of papers: <b><strike>May 22</strike>, June 7, 2015</b><br/>Author notification: <b>June 19, 2015</b><br/>Submission of camera-ready paper: <b>June 22, 2015</b></p><p><br/><b>SUBMISSION AND PUBLICATION</b><br/>Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template (<a href="http://www.acm.org/sigs/publications/proceedings-templates">http://www.acm.org/sigs/publications/proceedings-templates</a>) for the paper.</p><p>The paper should be supplied in MS Word or PDF format to <a href="https://easychair.org/conferences/?conf=messa2015">https://easychair.org/conferences/?conf=messa2015</a></p><p>The accepted workshop papers will be published in an ACM digital library. At least one author of all accepted papers must present the paper at the workshop.</p><p><br/><b>ORGANIZERS</b><br/>Reijo Savola, VTT Technical Research Centre of Finland, Finland<br/>Antti Evesti, VTT Technical Research Centre of Finland, Finland<br/>Anni Karinsalo, VTT Technical Research Centre of Finland, Finland<br/>Marco Hoffmann, NOKIA Networks, Germany<br/>Habtamu Abie, Norwegian Computing Centre, Norway</p><p><br/><b>PROGRAM COMMITTEE</b></p><p>Iris Adam, NOKIA Networks, Germany<br/>Thorsten Holz, Ruhr-Universität Bochum, Germany<br/>Wolfgang Hommel, Leibniz Supercomputing Centre, Germany<br/>Marina Krotofil, Hamburg University of Technology, Germany<br/>Wolfgang Leister, Norwegian Computing Center, Norway<br/>Fabio Martinelli, Institute of Informatics and Telematics, Italy<br/>Mohammad Mozumdar, California State University, Long Beach, USA<br/>Eila Ovaska, VTT Technical Research Centre of Finland, Finland<br/>Ebenezer Paintsil, Verifone, Norway<br/>Stefan Poslad, Queen Mary University of London, UK<br/>Juha Röning, University of Oulu, Finland<br/>Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium<br/>Einar Snekkenes, Gjøvik University College, Norway<br/>Arild Torjusen, Norwegian Computing Center, Norway<br/>Denis Treck, University of Ljubljana, Slovenia<br/>Yan Zhang, Simula Research Laboratory, Norway</p><p></p><p><b>ORGANISING PROJECTS</b><br/>IoTSec (iotsec.no)</p><hr/><p style="text-align: center"><span style="font-size:large">CALL FOR PAPERS<br/>MeSSa 2016<br/>3rd International Workshop on Measurability of Security in Software Architectures<br/><a rel="nofollow" class="external free" href="http://www.vtt.fi/messa2016">http://www.vtt.fi/messa2016</a><br/>Istanbul, Turkey, September 5-9, 2016<br/>Co-located with<br/>The 10th European Conference on Software Architecture (ECSA 2016)<br/><a rel="nofollow" class="external free" href="http://ecsa2016.iku.edu.tr/#workshops/">http://ecsa2016.iku.edu.tr/#workshops/</a></span></p><p><b>TOPICS</b><br/>Security-related incidents are increasing, and at the same time the society is based more and more on reliability of cyber-physical systems. Systematic approaches to measure security and to build security in are thus needed in order to build secure software systems and to offer security evidence for software architects, decision makers and end-users. Security measuring from software architectures is required to produce sufficient evidence of security level as early as in the design phase. Consequently, design-time security measuring supports “security by design” approach. In addition, software architectures have to support runtime security measuring to obtain up-to-date security information from online software systems. Runtime security measuring is exploited in situation-awareness and self-adaptive security, such as security of IoT in eHealth. Security metrics for adaptation should also support evaluation and validation of runtime security adaptation. The area of security metrics and security assurance metrics research is evolving, but still lacks widely accepted definitions of metrics and applicable measuring techniques for design-time and runtime security monitoring.</p><p>The workshop will provide a forum for dissemination, demonstration and discussion of original scientific and experimental results of security measurement topics. MeSSa 2015 solicits contributions on the following issues (but not limited to):</p><ul><li>Security, trust and privacy metrics</li><li>Security assurance metrics</li><li>Security, trust and privacy measurement systems and associated data gathering</li><li>Security measuring from software architectures and measurability-increasing mechanisms</li><li>Metrics for self-adaptive security</li><li>Taxonomies and ontologies on security metrics</li><li>Trade-off analysis and decision-making</li><li>Adaptive metrics approach for measuring risks, threats, operational activities, and the effectiveness of data protection</li><li>Metrics for evaluation and validation of security adaptation</li><li>Evolutionary techniques for developing adaptive security metrics</li><li>Adaptive metric for measuring security level of a real-time system</li><li>Visualizing security metrics</li><li>Methods for analyzing sensitivity and assessing uncertainty in adaptive security</li><li>Techniques for integrating data analytics to support security decision-making and adaptive control</li><li>Optimization and security challenges in IoT-based architectures for eHealth</li><li>Cognitive security capabilities of IoT-based architectures for eHealth</li><li>Evaluation of adaptive security and privacy solutions</li><li>Real-time anomaly detection in communication networks</li><li>Innovative visualization methods for detection of attacks in networks</li><li>Security functionality in network management systems to assist administrators/operators</li><li>SDN-based methods for security monitoring and assurance</li><li>Security issues of SDN-based network control software</li><li>Security assurance for third party control applications in SDN</li></ul><p><br/><b>IMPORTANT DATES</b><br/>Submission of papers: <b><strike>May 22</strike>, June 7, 2015</b><br/>Author notification: <b>June 19, 2015</b><br/>Submission of camera-ready paper: <b>June 22, 2015</b></p><p><br/><b>SUBMISSION AND PUBLICATION</b><br/>Authors should submit a workshop paper no longer than seven pages. Papers of 5 pages in length or longer are considered Full Papers. The authors should use the ACM template (<a rel="nofollow" class="external free" href="http://www.acm.org/sigs/publications/proceedings-templates">http://www.acm.org/sigs/publications/proceedings-templates</a>) for the paper.</p><p>The paper should be supplied in MS Word or PDF format to <a rel="nofollow" class="external free" href="https://easychair.org/conferences/?conf=messa2015">https://easychair.org/conferences/?conf=messa2015</a></p><p>The accepted workshop papers will be published in an ACM digital library. At least one author of all accepted papers must present the paper at the workshop.</p><p><br/><b>ORGANIZERS</b><br/>Reijo Savola, VTT Technical Research Centre of Finland, Finland<br/>Antti Evesti, VTT Technical Research Centre of Finland, Finland<br/>Anni Karinsalo, VTT Technical Research Centre of Finland, Finland<br/>Marco Hoffmann, NOKIA Networks, Germany<br/>Habtamu Abie, Norwegian Computing Centre, Norway</p><p><br/><b>PROGRAM COMMITTEE</b></p><p>Iris Adam, NOKIA Networks, Germany<br/>Thorsten Holz, Ruhr-Universität Bochum, Germany<br/>Wolfgang Hommel, Leibniz Supercomputing Centre, Germany<br/>Marina Krotofil, Hamburg University of Technology, Germany<br/>Wolfgang Leister, Norwegian Computing Center, Norway<br/>Fabio Martinelli, Institute of Informatics and Telematics, Italy<br/>Mohammad Mozumdar, California State University, Long Beach, USA<br/>Eila Ovaska, VTT Technical Research Centre of Finland, Finland<br/>Ebenezer Paintsil, Verifone, Norway<br/>Stefan Poslad, Queen Mary University of London, UK<br/>Juha Röning, University of Oulu, Finland<br/>Riccardo Scandariato, Katholieke Universiteit Leuven, Belgium<br/>Einar Snekkenes, Gjøvik University College, Norway<br/>Arild Torjusen, Norwegian Computing Center, Norway<br/>Denis Treck, University of Ljubljana, Slovenia<br/>Yan Zhang, Simula Research Laboratory, Norway</p><p></p><p><b>ORGANISING PROJECTS</b><br/>ASSET (asset.nr.no)<br/><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D" lang="EN-GB">SENDATE Celtic-Plus Flagship</span></p><p></p></body> --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------^</sourcetext></parsererror>