About STAM:
Distributed
computer networked systems and services have become a crucial infrastructure
element for the organization of modern society. These networks and services are
required to be more and more open and new technology is designed to facilitate
the inter-operation between these networks composed of heterogeneous,
communicating devices. Since the environment may be potentially hostile and
contain malicious components, it is crucial to define frameworks adapted to
distributed systems to enforce security and privacy.
The
STAM workshop tries to answer how vulnerability, intrusions and attacks
modeling can help users understand the occurrence of malicious behaviors in
order to avoid them, and what are the advantages and drawbacks of the existing
models. At the same time, the workshop tries to understand how to solve the
challenging security testing and monitoring problem given that testing
distributed systems is a complex task and security will add new challenges and
difficulties to be solved.
IMPORTANT DATES
Submission Deadline:
January 31st, 2016 extented to February 19th, 2016
Author Notification: March 21st, 2016
Camera-Ready Due: April 28th, 2016
Workshop Date: June 27th, 2016
Topics of Interest:
•Security
testing in distributed systems
•Security
testing in distributed systems
•Security
monitoring in distributed systems
•Testing
techniques in distributed systems: Fuzz, regression, mutation, safety and
robustness etc.
•Formals
models for security in distributed systems
•Security
requirements definition and modeling
•Security
testing
and monitoring automation
•Attacks
tolerance in distributed environments
•Remediation
and reactions against attacks in distributed systems
•Security
testing and monitoring for cloud and multi-cloud systems
•Security
testing and monitoring for IoT
•Security
testing and monitoring for big data
•Security
testing and monitoring for critical infrastructure
•Trust
and privacy in distributed environments
•Tools
for security testing and monitoring
Industrial experience
reports
General Chairs :
•Ana
Rosa Cavalli
(Montimage/Telecom
SudParis)
• Wissam
Mallouli (Montimage, France)
Program Committee :
•Fabien
Autrel
(Telecom Bretagne, France)
•Javier
Baliosian
(University of the Republic, Uruguay)
•Valentina
Casola,
(CERICT, Italy)
•Thibault Cholez
(INRIA, France)
•Josep Domingo-Ferrer
(Universitat Rovira i Virgili,
Catalonia)
•Jürgen
Grossman
(Fraunhofer Fokus,
Germany)
•Rob
Hierons
(Brunel University, UK)
•Natalia
Kushik (Institut
Mines-Telecom/Telecom SudParis,
France)
•Alexandre
K. Petrenko
(ISPRAS, Russia)
•Shinsaku Kiyomoto
(KDDI R&D Laboratories Inc, Japan)
•Stephane
Maag
(Telecom SudParis)
•Bertrand
Mathieu (Orange, France)
•Mercedes
Merayo (Complutense
University of Madrid, Spain)
•Edgardo
Montes de Oca
(Montimage, France)
•Antonio
Skarmeta
(Universidad de Murcia, Spain)
•Nina
Yevtushenko
(Tomsk University - Russia)
•Fatiha
Zaidi (Universite de
Paris Sud,
France)
Paper
Selection Procedure:
Full
papers (6 pages) and short papers (2 pages) are requested in IEEE two-column
format. Also, demonstrations of security
testing tools (4 pages) and project success stories are solicited. Each paper
will be reviewed by at least 3 program committee members. Easychair
platform is used for the submission and review process.
The
STAM workshop proceedings are expected
to be published in the IEEE ICDCS Proceedings.