SPattern 2009

From Openresearch
Jump to: navigation, search
SPattern 2009
3rd International Workshop on Secure systems methodologies using patterns (SPattern'09)
Dates Aug 31, 2009 (iCal) - Sep 4, 2009
Location: Linz, Austria
Loading map...

Important dates
Submissions: Mar 20, 2009
Camera ready due: Mar 29, 2009
Table of Contents

[Apologies for multiple copies of this announcement]

                          CALL FOR PAPERS

      3rd International Workshop on Secure systems methodologies 
	                  using patterns (SPattern'09) 

                        in conjunction with the
                   6 th International Conference on
       Trust, Privacy & Security in Digital Business (TrustBus'09)

               20th International Conference on Database 
               and Expert Systems Applications (DEXA 2009)

             Linz, Austria, August 31 - September 04, 2009



Security patterns have arrived to a stage where there are a significant 
number of them, two books about them have been published, and industry 
is starting to accept and use them. Analysis and design patterns have 
been around for about ten years and have found practical use in many 
projects. They have been incorporated into several software development 
methodologies where less experienced developers can use them to receive 
the advice and knowledge of experts. The situation is not so clear for 
security patterns because no accepted methodology exists for their use.

Catalogs of security patterns are a good step, but they are not enough. 
Building secure systems is a difficult process where security aspects are 
interlaced with the satisfaction of functional requirements. Developers 
are typically experts on a language or a development methodology but know 
little about security, which results in them not knowing what security 
mechanisms make sense at which moments. We need methodologies that guide 
a designer at each stage of the development cycle. A few of them have 
appeared, but none of them has been tested in production applications.

This workshop focuses on secure software methodologies. We seek papers 
describing individual security patterns, new methodologies, new aspects 
of existing methodologies, pattern languages to use in the methodologies, 
reference architectures, blueprints, and related aspects. Experiences in 
applying the methodologies to real situations are especially welcome.


Authors are invited to submit research contributions, practical 
experience reports and demos.
Papers must be original not previously published nor submitted in 
parallel for publication to any other conference, workshop or journal. 
Submissions must be in pdf and consist of no more than 5 pages in IEEE 
double column format.

Accepted papers will be included in the DEXA workshop proceedings, to 
be published by IEEE and available at the conference site. Final versions 
of the papers must comply with "Authors Instructions" which are 
accessible at:

You are invited to submit your paper via DEXA'09 ConfDriver at: For further inquiries, please contact 
either of the program committee chairs. The conference organization office 
can be reached at

At least one author of each accepted paper is required to attend the 
conference and present the paper. Her/his registration fee must be paid 
before May 31, 2009.

Important dates:
Submission of abstract      March, 13th
Submission of full paper    March, 20th
Notification to authors     May, 8th
Final version due           May, 29th


Workshop chairs
Eduardo B. Fernandez        Florida Atlantic University (USA)
Günther Pernul              University of Regensburg (Germany)

Program Committee
Fernandez-Medina, Eduardo   Universidad de Castilla-La Mancha (Spain)
Heath, Craig                Symbian (UK)
Jürjens, Jan                The Open University (UK)
Lambrinoudakis, Kostas      University of the Aegean (Greece)
Maña, Antonio               University of Malaga (Spain)
Mouratidis, Haralambos      University of East London (UK)
Ray, Indrakshi              Colorado State University (USA)
Schumacher, Markus          Virtual Forge GmbH & Fraunhofer SIT (Germany)
Sommerlad, Peter            HSR Hochschule für Technik Rapperswil (Switzerland)
Thomsen, Dan                Cyber Defense Agency (USA)
VanHilst, Michael           Florida Atlantic University (USA)
Washizaki, Hironori         National Institute of Informatics, Tokyo (Japan)
Yoder, Joe                  The Refactory, Inc. (USA)
Yoshioka, Nobukazu          National Institute of Informatics, Tokyo (Japan)


Questions concerning the Call for Papers or submissions should be send 
by E-Mail to: or

Questions concerning the organization of the conference should be send 
by E-Mail to:

Prof. Dr. Eduardo B. Fernandez
Professor of Computer Science & Engineering
Department of Computer Science and Engineering
Florida Atlantic University
777 Glades Road
Boca Raton, FL 33431 - USA

Prof. Dr. Günther Pernul
Department of Information Systems
Universitätstr. 31
D-93053 Regensburg

This CfP was obtained from WikiCFP

Facts about "SPattern 2009"
AcronymSPattern 2009 +
Camera ready dueMarch 29, 2009 +
End dateSeptember 4, 2009 +
Event typeWorkshop +
Has coordinates48° 18' 21", 14° 17' 10"Latitude: 48.305908333333
Longitude: 14.286197222222
Has location cityLinz +
Has location countryCategory:Austria +
Homepage +
IsAEvent +
Start dateAugust 31, 2009 +
Submission deadlineMarch 20, 2009 +
Title3rd International Workshop on Secure systems methodologies using patterns (SPattern'09) +