First International Workshop on Protection by Adaptation PBA-2005 (PBA-2005)

Venue: Hotel Istana

Location: Kuala Lumpur, Malaysia

Event Date/Time: Jul 14, 2005 End Date/Time: Jul 14, 2005
Registration Date: May 11, 2005
Early Registration Date: Jun 11, 2005
Abstract Submission Date: Feb 15, 2005
Paper Submission Date: Feb 15, 2005
Report as Spam


For most people *security* refers to cryptographic algorithms, biometric authentication techniques, passwords, etc.
Beyond these intuitive notions, security is rather a very broad topic and may be viewed from a variety of other perspectives,
including new access control models, software architectures for security systems, and security policies specifications.
Emerging applications are subject to a high number of attacks due to the distributed nature of these new environments,
mobility of users and devices, services heterogeneity and the different capabilities of devices used to access these services.

The aim of this workshop is to encourage the research community to better consider context-based security as a new trend that may face
future more subtle security attacks. We believe that the force of a good security system should not rely only on the force of security
protocols but also on the way it copes with new and completely unpredictable situations or at least learn from new situations and updates
its behavior accordingly. This goal can be reached by making future security solutions freely adaptive.

We look for original submissions on the following topics (but not limited to):

+ Security in mobile, wireless and ad hoc environments
+ Dynamic security policies
+ Context-based access control
+ Context in security
+ Agile encryption
+ Artificial intelligence and security
+ Adaptive security solutions
+ Middleware for context-based security systems
+ Conflicting norms issues in security policies
+ Flexible security architectures for pervasive applications
+ Security contexts discovery, retrieval, representation and modeling
+ Modeling users’ security profiles
+ Metrics for evaluating security infrastructures
+ Testing of adaptive security systems
+ Software architectures for adaptive security (design patterns, etc)
+ Adaptive security levels in heterogeneous environments
+ Enforcing applications security semantics
+ Predicting security threats


Additional Information

Submission of papers -------------------- Prospective authors are invited to submit papers for oral presentation in any of the areas listed above. The length of papers should not exceed 10-12 pages for full papers, 5 pages for short papers and technical notes. Instructions for preparing the manuscript are available at the iiWAS conference web site Papers should be submitted to The workshop proceedings will be published by the Austrian Computer Society (OCG) as a book with ISBN in the series. Selected papers will be further considered for publication in special issues of the International Journal on Wireless and Mobile Computing, and International Journal of Web Information Systems.