The safety and well-being of all conference participants is our priority. After evaluating the ongoing COVID-19 situation, the decision has been made to run ESORICS 2020 and the associated workshops as an all-digital conference experience, and it will now be an online event. Therefore, SECPRE 2020, like ESORICS 2020, will take place as entirely virtual. The conference and workshop dates remain the same: September 14 - 18, 2020.
Software engineering is an essential aspect for obtaining a systematic, disciplined and quantifiable approach to the development, operation, and maintenance of software and services. Incorporating security and privacy during the engineering process is of vital importance for assuring the development of reliable, correct, robust and trustful systems as well as adaptive, usable and evolving software services that satisfy users’ requirements.
For many years software engineers were focused in the development of new software thus considering security and privacy mainly during the development stage as an ad-hoc process rather than an integrated one initiated in the system design stage. However, the data protection regulations, the complexity of modern environments such as IoT, IoE, Cloud Computing, Big Data, Cyber Physical Systems etc. and the increased level of users’ awareness in IT have forced software engineers to identify security and privacy as fundamental design aspects leading to the implementation of more trusted software systems and services. Researchers have addressed the necessity and importance of implementing design methods for security and privacy requirements elicitation, modeling and implementation the last decades. Today Security by Design (SbD) and Privacy by Design (PbD) are established research areas that focus on these directions.
Methods, tools and techniques for the elicitation, analysis and modeling of security and privacy requirements
Security and Privacy testing methods and tools
Adaptive Security and Privacy related methods and tools
Methods and tools for designing usable secure and privacy-aware systems
Methods and tools for the coordination of legal requirements along with Security and Privacy requirements
Security and Privacy requirements verification
Integration of functional, security and privacy requirements
Frederic Cuppens, Telecom Bretange, France
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Vasiliki Diamantopoulou, University of the Aegean, Greece
Eric Dubois, Luxembourg Institute of Science & Technology, Luxembourg
Carmen Fernandez-Gago, University of Malaga, Spain
Eduardo Fernandez-Medina, University of Castilla-La Mancha, Spain
Mohamad Gharib, University of Florence, Italy
Paolo Giorgini, University of Trento, Italy
Maritta Heisel, Univeristy of Duisburg-Essen, Germany
Jan Juerjens, University of Koblenz-Landau, Germany
Maria Karyda, Univeristy of the Aegean, Greece
Costas Lambrinoudakis, University of Piraeus, Greece
Tong Li, Beijing University of Technology, China
Fabio Martinelli , National Research Council - C.N.R., Italy
Aaron Massey, University of Maryland, USA
Haralambos Mouratidis, University of Brighton, UK
Liliana Pasquale, University College Dublin, Ireland
Michalis Pavlidis, University of Brighton, UK
David Garcia Rosado, University of Castilla-La Manca, Spain
Pierangela Samarati, Università degli Studi di Milano, Italy
Aggeliki Tsohou, Ionian University, Greece
Nicola Zannone, Eindhoven University of Technology, The Netherlands
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. The workshop proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.
All submissions should follow the LNCS template from the time they are submitted. Submitted papers can be either full papers or short papers. Full papers should be at most 20 pages while short papers should be at most 8 pages including the bibliography in both cases. All submissions must be written in English. Submissions are to be made to the Submission web site. Only pdf files will be accepted.
Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that their papers will be presented at the conference.
June 28, 2020 July 10, 2020 (11:59 p.m.American Samoa time UTC-11)
Notification to authors
July 19, 2020 August 4, 2020
August 16, 2020 August 31, 2020
List of Accepted Papers
Vasiliki Diamantopoulou, Christos Kalloniatis, Christos Lyvas, Konstantinos Maliatsos, Matthieu Gay, Thanasis Kanatas and Costas Lambrinoudakis, Aligning the Concepts of Risk, Security and Privacy towards the design of Secure Intelligent Transport Systems
Angel Jesus Varela Vaca, David García Rosado, Luis Enrique Sánchez, Maria Teresa Gómez López, Rafael M. Gasca and Eduardo Fernádez-Medina, Definition and Verification of Security Configurations of Cyber-Physical Systems
Dimitra Georgiou and Costas Lambrinoudakis, GDPR Compliance: Proposed Guidelines for Cloud-based Health Organizations
Shamal Faily, Claudia Iacob, Raian Ali and Duncan Ki-Aries, Identifying Implicit Vulnerabilities through Personas as Goal Models
For further inquiries, please contact the program committee chairs at: