International Workshop on Protection by Adaptation (PBA-2005)
	     19-21 September 2005, Kuala Lumpur, Malaysia
	       http://www.iiwas.org/workshops/pba-2005/
			 In conjunction with
		   the 7th International Conference
   on Information Integration and Web Based Applications & Services
			     (iiWAS2005)
      http://www.iiwas.org/conferences/iiwas2005/iiwas2005.html

Scope


For most people"security" refers to cryptographic algorithms,
biometric authentication techniques, passwords, etc. Beyond these
intuitive notions, security is rather a very broad topic and may be
viewed from a variety of other perspectives, including new access
control models, software architectures for security systems, and
security policies specifications.

Emerging applications are subject to a high number of attacks due to
the distributed nature of these new environments, mobility of users
and devices, services heterogeneity and the different capabilities of
devices used to access these services.

The aim of this workshop is to encourage the research community to
better consider context-based security as a new trend that may face
future more subtle security attacks. We believe that the force of a
good security system should not rely only on the force of security
protocols but also on the way it copes with new and completely
unpredictable situations or at least learn from new situations and
updates its behavior accordingly. This goal can be reached by making
future security solutions freely adaptive.

We look for original submissions on the following topics (but not limited to):

- Security in mobile, wireless and ad hoc environments
- Dynamic security policies
- Context-based access control
- Context in security
- Agile encryption
- Artificial intelligence and security
- Adaptive security solutions
- Middleware for context-based security systems
- Conflicting norms issues in security policies
- Flexible security architectures for pervasive applications
- Security contexts discovery, retrieval, representation and modeling
- Modeling users' security profiles
- Metrics for evaluating security infrastructures
- Testing of adaptive security systems
- Software architectures for adaptive security (design patterns, etc)
- Adaptive security levels in heterogeneous environments
- Enforcing applications security semantics
- Metrics for predicting security threats

Submission of papers

Prospective authors are invited to submit papers for oral presentation
in any of the areas listed above. The length of papers should not
exceed 10-12 pages for full papers, 5 pages for short papers and
technical notes. Instructions for preparing the manuscript are
available at the iiWAS conference web site
http://www.iiwas.org/conferences/iiwas2005/submission.htm.  Papers
should be submitted to pba2005@iiwas.org

The workshop proceedings will be published by the Austrian Computer
Society (OCG) as a book with ISBN in the books@ocg.at series.

 
Important dates

Submission of papers: June 20th, 2005
Author notification: July 23rd, 2005
Final Camera-Ready Submission and Registration: August 10th, 2005


Workshop Chair

Ghita Kouadri Moste'faoui
LIP6, Université Paris VI, France
Ghita {dot} Kouadri-Mostefaoui {at} lip6 {dot} fr

Program committee

H. Bettahar (France)
P. Bre'zillon (France)
Y. Challal (France)
A. Derhab (Algeria)
D. Chiu Kak Wah (Hong Kong)
S. Dietrich (USA)
D. Djenouri (Algeria)
P. Hung (Canada)
I. Khalil Ibrahim (Austria)
M. Kellil (France)
M. Khedr (Egypt)
L. Khelladi (Algeria)
G. Kouadri M. (France)
S. Kouadri M. (Switzerland)
Z. Maamar (U.A.E)
N.C. Narendra (India)
M. Nunez (Spain)
K. Pousttchi (Germany)
L. Ruf (Switzerland)
A. Tveit (Norway)
E. Witzke (USA)
H. Yahyaoui (Canada)

Workshop location

The workshop will be held in Hotel Istana, Kuala Lumpur, Malaysia.