International Workshop on Protection by Adaptation (PBA-2005) 19-21 September 2005, Kuala Lumpur, Malaysia http://www.iiwas.org/workshops/pba-2005/ In conjunction with the 7th International Conference on Information Integration and Web Based Applications & Services (iiWAS2005) http://www.iiwas.org/conferences/iiwas2005/iiwas2005.html Scope For most people"security" refers to cryptographic algorithms, biometric authentication techniques, passwords, etc. Beyond these intuitive notions, security is rather a very broad topic and may be viewed from a variety of other perspectives, including new access control models, software architectures for security systems, and security policies specifications. Emerging applications are subject to a high number of attacks due to the distributed nature of these new environments, mobility of users and devices, services heterogeneity and the different capabilities of devices used to access these services. The aim of this workshop is to encourage the research community to better consider context-based security as a new trend that may face future more subtle security attacks. We believe that the force of a good security system should not rely only on the force of security protocols but also on the way it copes with new and completely unpredictable situations or at least learn from new situations and updates its behavior accordingly. This goal can be reached by making future security solutions freely adaptive. We look for original submissions on the following topics (but not limited to): - Security in mobile, wireless and ad hoc environments - Dynamic security policies - Context-based access control - Context in security - Agile encryption - Artificial intelligence and security - Adaptive security solutions - Middleware for context-based security systems - Conflicting norms issues in security policies - Flexible security architectures for pervasive applications - Security contexts discovery, retrieval, representation and modeling - Modeling users' security profiles - Metrics for evaluating security infrastructures - Testing of adaptive security systems - Software architectures for adaptive security (design patterns, etc) - Adaptive security levels in heterogeneous environments - Enforcing applications security semantics - Metrics for predicting security threats Submission of papers Prospective authors are invited to submit papers for oral presentation in any of the areas listed above. The length of papers should not exceed 10-12 pages for full papers, 5 pages for short papers and technical notes. Instructions for preparing the manuscript are available at the iiWAS conference web site http://www.iiwas.org/conferences/iiwas2005/submission.htm. Papers should be submitted to pba2005@iiwas.org The workshop proceedings will be published by the Austrian Computer Society (OCG) as a book with ISBN in the books@ocg.at series. Important dates Submission of papers: June 20th, 2005 Author notification: July 23rd, 2005 Final Camera-Ready Submission and Registration: August 10th, 2005 Workshop Chair Ghita Kouadri Moste'faoui LIP6, Université Paris VI, France Ghita {dot} Kouadri-Mostefaoui {at} lip6 {dot} fr Program committee H. Bettahar (France) P. Bre'zillon (France) Y. Challal (France) A. Derhab (Algeria) D. Chiu Kak Wah (Hong Kong) S. Dietrich (USA) D. Djenouri (Algeria) P. Hung (Canada) I. Khalil Ibrahim (Austria) M. Kellil (France) M. Khedr (Egypt) L. Khelladi (Algeria) G. Kouadri M. (France) S. Kouadri M. (Switzerland) Z. Maamar (U.A.E) N.C. Narendra (India) M. Nunez (Spain) K. Pousttchi (Germany) L. Ruf (Switzerland) A. Tveit (Norway) E. Witzke (USA) H. Yahyaoui (Canada) Workshop location The workshop will be held in Hotel Istana, Kuala Lumpur, Malaysia.