International Workshop on Protection by Adaptation (PBA-2005)

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

        International Workshop on Protection by Adaptation (PBA-2005)

                19-21 September 2005, Kuala Lumpur, Malaysia

In conjunction with the 7th International Conference on Information
Integration and Web Based Applications & Services (iiWAS2005)



For most people *security* refers to cryptographic algorithms,
biometric authentication techniques, passwords, etc.
Beyond these intuitive notions, security is rather a very broad topic
and may be viewed from a variety of other perspectives,
including new access control models, software architectures for
security systems, and security policies specifications.
Emerging applications are subject to a high number of attacks due to
the distributed nature of these new environments,
mobility of users and devices, services heterogeneity and the different
capabilities of devices used to access these services.

The aim of this workshop is to encourage the research community to
better consider context-based security as a new trend that may face
future more subtle security attacks. We believe that the force of a
good security system should not rely only on the force of security
protocols but also on the way it copes with new and completely
unpredictable situations or at least learn from new situations and
its behavior accordingly. This goal can be reached by making future
security solutions freely adaptive.

We look for original submissions on the following topics (but not
limited to):

+ Security in mobile, wireless and ad hoc environments
+ Dynamic security policies
+ Context-based access control
+ Context in security
+ Agile encryption
+ Artificial intelligence and security
+ Adaptive security solutions
+ Middleware for context-based security systems
+ Conflicting norms issues in security policies
+ Flexible security architectures for pervasive applications
+ Security contexts discovery, retrieval, representation and modeling
+ Modeling users' security profiles
+ Metrics for evaluating security infrastructures
+ Testing of adaptive security systems
+ Software architectures for adaptive security (design patterns, etc)
+ Adaptive security levels in heterogeneous environments
+ Enforcing applications security semantics
+ Metrics for predicting security threats

Submission of papers

Prospective authors are invited to submit papers for oral presentation
in any of the areas listed above. The length of papers should not
exceed 10-12 pages for full papers, 5 pages for short papers and
technical notes. Instructions for preparing the manuscript are
at the iiWAS conference web site .

Papers should be submitted to

The workshop proceedings will be published by the Austrian Computer
Society (OCG) as a book with ISBN in the series.

Selected papers will be further considered for publication in special
issues of the International Journal on Wireless and Mobile Computing,
and International Journal of Web Information Systems.

Workshop chair

Ghita Kouadri Mostéfaoui (Ghita Kouadri-Mostefaoui lip6

Program committee

H. Bettahar (France)
P. Brézillon (France)
Y. Challal (France)
A. Derhab (Algeria)
D. Chiu Kak Wah (Hong Kong)
S. Dietrich (USA)
D. Djenouri (Algeria)
P. Hung (Canada)
I. Khalil Ibrahim (Austria)
M. Kellil (France)
M. Khedr (Egypt)
L. Khelladi (Algeria)
G. Kouadri M. (France)
S. Kouadri M. (Switzerland)
Z. Maamar (U.A.E)
N.C. Narendra (India)
M. Nunez (Spain)
K. Pousttchi (Germany)
L. Ruf (Switzerland)
A. Tveit (Norway)
E. Witzke (USA)
H. Yahyaoui (Canada)

Important dates

+ Submission of papers: June 20th, 2005
+ Author notification: July 23rd, 2005
+ Final Camera-Ready Submission and Registration: August 10th, 2005

Site Timeline