征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

VSC track brings the opportunity for researchers and developers from industry and the academic world to report the state of the art and exchange ideas on correcteness, confidentiality, security, privacy and reliability of software technologies. The idea is to foster research and development for the advanced support needed to enhance the level of quality and of user trust on services holding personal data and involving collaboration with unknown remote parties. 

Nowadays, the widespread use of smart devices, such as smart cards, watches, phones, and tablets, connected by the ubiquitous public Internet network, enables us to easily access a vast range of useful services. Such devices allow people to perform every day activities that either play a role in a collaborative task or are actually supported by some real-time or asynchronous collaboration technology. Example services and applications are monitoring of health-related functions, messaging, the trading of goods, remote writing or signing of digital documents, activities on social networks or work groups, remotely locating someone/something, and even services improving our ability to observe/control the environment around us. 

In this context, applications that hold or exchange sensitive user data, like personal details, security pin-codes, or biometric data, need special protection against software failures or malicious behaviour of downloaded code, that may expose the user to highly undesired consequences, such as threats to confidentiality and even financial or health danger. 

This is even more true since the trend is indeed towards integration, that is, not to have many specialized access devices but a single, multi-purpose host handling many (or all) kinds of user services and its related data together, even though with limited computing resources, such as any small device hosting a Java or .Net run-time environment. 

Moreover, inherent mobility and distribution of these small, open computing devices increases the complexity of the solutions to be adopted for handling secure and reliable execution of untrusted code, in order to ensure the data confidentiality strongly required by the applications. 

As a consequence, new and specially designed techniques can be devised and applied in order to reach the goal of increasing the trust on such a distributed computing environment to a level of strength matching with the high strength of the above safety critical requirements. 

征稿信息

重要日期

2017-03-15
初稿截稿日期
2017-04-02
初稿录用日期

征稿范围

TOPICS:

  • Verification techniques

  • Novel testing and validation algorithms

  • Dependability assessment techniques

  • Model-based validation and testing techniques for security and privacy

  • Analysis of threats and countermeasures to the security of smart devices

  • Static and run-time techniques for byte-code level verification and validation

  • Validation testing of safety critical technologies

  • Validation of large-scale distributed applications

  • Software testing in multi-core environments

  • Risk-based approaches to software validation

  • Assessing security and robustness of applications 

  • Software architectures for securing software on collaboration devices

  • Static code analysis tailored to security and privacy for iOS and Android based apps

  • Performance analysis of security-related features

  • Performance and QoS testing

  • Testing and analysis tools

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    06月21日

    2017

    06月23日

    2017

  • 03月15日 2017

    初稿截稿日期

  • 04月02日 2017

    初稿录用通知日期

  • 06月23日 2017

    注册截止日期

主办单位
Poznan University of Economics and Business
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询