Call for Papers

          4th International Workshop on Quality of Protection
                               (QoP 2008)
                        http://qop-workshop.org

                            October 27, 2008
                          Alexandria, VA, USA

                        An ACM CCS 2008 workshop
                   http://www.sigsac.org/ccs/CCS2008


WORKSHOP OVERVIEW

In the last few decades, Information Security has gained numerous
standards, industrial certifications, and risk analysis methodologies.
However, the field still lacks the strong, quantitative,
measurement-based assurance that we find in other fields. For example,
Networking researchers have created and utilize Quality of Service
(QoS), Service Level Agreements (SLAs), and performance evaluation
measures. Empirical Software Engineering has made similar advances
with software measures: processes to measure the quality and
reliability of software exist and are appreciated in industry.

Security looks different. Even a fairly sophisticated standard such as
ISO17799 has an intrinsically qualitative nature. Notions such as
Security Metrics, Quality of Protection (QoP) or Protection Level
Agreement (PLA) have surfaced in the literature, but they still have a
qualitative flavor. Furthermore, many recorded security incidents have
a non-IT cause. As a result, security requires a much wider notion of
"system" than do most other fields in computer science. In addition to
the IT infrastructure, the "system" in security includes users, work
processes, and organizational structures.

The goal of the QoP Workshop is to help security research progress
towards a notion of Quality of Protection in Security comparable to
the notion of Quality of Service in Networking, Software Reliability,
or measures in Empirical Software Engineering.

SUBMISSION TOPICS

Original submissions are solicited from industry and academic experts
to presents their work, plans and views related to Quality of
Protection. The topics of interest include but are not limited to:

     * Industrial experience
     * Security risk analysis
     * Security measures
     * Reliability analysis
     * Security quality assurance
     * Measurement-based decision making and risk management
     * Empirical assessment of security architectures and solutions
     * Mining data from attack and vulnerability repositories
     * Measurement theory
     * Formal theories of security measures
     * Security measurement and monitoring
     * Experimental validation of models
     * Simulation and statistical analysis
     * Stochastic modeling

IMPORTANT DATES

     * May 15, 2008 - Paper submission due
     * July 11, 2008 - Acceptance notification
     * August 10, 2008 - Camera-ready papers due

PROGRAM CHAIRS:

     * Andy Ozment, US
     * Ketil Stolen, SINTEF, NO

PROGRAM COMMITTEE:

     * Alessandro Acquisti - Carnegie Mellon University (US)
     * Guenter Bitz - SAP (DE)
     * Jean Camp - Indiana University (US)
     * Dieter Gollmann - TU Hamburg-Harburg (DE)
     * Sushil Jajodia - George Mason University (US)
     * Hongxia Jin - IBM Almaden Research Center (US)
     * Erland Jonsson - Chalmers University of Technology (SE)
     * Audun Josang - Queensland University (AU)
     * Yucel Karabulut - SAP Research Palo Alto (US)
     * Guenter Karjoth - IBM Research (CH)
     * Volkmar Lotz - SAP (FR)
     * Fabio Massacci - University of Trento (IT)
     * John McHugh - Dalhousie University (CA)
     * Stephan Neuhaus - Saarland University (DE)
     * Andy Ozment - (US)
     * Eduardo Fernández-Medina - University of Castilla-La Mancha (ES)
     * Shari Lawrence Pfleeger - RAND Corporation (US)
     * Riccardo Scandariato - Katholieke Universiteit Leuven (BE)
     * Tomas Sander - HP Labs (US)
     * Santosh Shrivastava - University of Newcastle upon Tyne (UK)
     * Anoop Singhal - NIST (US)
     * Vipin Swarup - The MITRE Corporation (US)
     * Nicola Zannone - University of Trento (IT)

PAPER SUBMISSION

Original research papers are solicited in any of the above mentioned
topics describing significant research results. Preliminary research
results can be submitted in the form of short papers. We also solicit
industry experience reports about the use of security measures in
industrial environments. Industry papers should have at least one
author from industry or government, and will be considered for their
industrial relevance.

Papers are required (1) to explicitly state the hypothesis being
tested, or characterize the problem being solved in the form of
success criteria, and (2) to have a research methodology section. The
research methodology section should contain enough details that a
reader could reproduce the work, at least as a thought-experiment.
Where appropriate this section should include information like:
materials, apparatus and stimuli used, a description of the subjects
or data sets used, the experimental design, and the procedure
followed.

Authors should use the ACM SIG proceedings template when preparing
their submission. The page limit for the final proceedings version
will be 6 pages in double-column ACM format; short papers are limited
to 3 pages. Only PDF or PS files are accepted.

PUBLICATION

The proceedings of the workshop will be published by the ACM; it will
have an ISBN number and be included in the ACM digital library.
Authors of accepted papers will be expected to give full presentations
at the workshop.