30th Annual International Computer Software and Applications Conference

Chicago, September 17-21, 2OO6

Security, Privacy, and Trust for Pervasive Applications (SPTPA 2006)

Security, Privacy, and Trust for Pervasive Applications (SPTPA 2006)


Advanced Program for SPTPA (pdf)


Pervasive computing has progressed significantly during this decade due to the developments and advances in portable low-cost light-weight devices and emergent short range, and low-power wireless communication networks. Pervasive computing focuses on combining computing and communications with the surrounding physical environment and make computing and communication transparent to the users in day to day activities. In pervasive computing, numerous, casually accessible, often invisible, frequently mobile or embedded devices form an ad hoc network, which sometimes connects to fixed networks structure too. These pervasive computing devices often collect information about the surrounding environment using on board location and other sensors. Pervasive computing has the inherent disadvantages of slow expensive connections, frequent line disconnection, limited host bandwidth, location dependent data, etc. These challenges make the pervasive computing applications even more vulnerable. Traditional security measures do not fit well in pervasive computing. Since location and contexts are key attributes of pervasive computing applications, the privacy issues need to be handled in a different way than traditional computing. The devices leave and join in an ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we solicit papers on the challenges, requirements, tools, and techniques related to security, privacy, and trust for pervasive applications along with some open issues. This workshop will serve as a platform for the interaction among like-minded researchers and practitioners to identify future theoretical and experimental research directions of security, privacy, and trust in pervasive applications.


Topics of interest include, but are not limited to, the following:

  • Security challenges in pervasive computing
  • Intrusion detections in pervasive computing
  • Models for access control and authentication for pervasive applications
  • Secure service discovery mechanisms
  • Hardware security issues for pervasive computing
  • Analysis of security protocols for pervasive computing
  • Models for privacy management
  • Day to day privacy in pervasive computing
  • Location aware privacy
  • Privacy aware service discovery mechanisms
  • Protocols for trust management in pervasive computing
  • Models for ensuring trust in pervasive environments
  • Trust assessment, negotiation, and collaboration
  • Audit and accountability in pervasive systems
  • Secure information management in pervasive computing
  • Tradeoffs between security and other criteria
  • Autonomous adaptation of pervasive systems to changes in threats
  • Pervasive security and privacy impact on social and legal aspects


Apr 1 , 2006: Workshop Paper Submission due date (Deadline Extended to Friday April 14).
May 15, 2006 notification of acceptance
June 25, 2006 camera-ready due


Papers must be submitted electronically via the SPTPA 2006 Submission Page ( The format of submitted papers should follow the guidelines for IEEE conference proceedings. All papers will be carefully reviewed by at least three reviewers. Papers will be accepted (and can be submitted) as regular papers (six pages), short papers, or fast abstracts. Acceptance and final category will depend on reviewer feedback.

Accepted papers or fast abstracts will be published in the workshop proceedings of the 30th IEEE Computer Software and Applications Conference (COMPSAC 2006) by IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings.



Sheikh Iqbal Ahamed
Dept. of Math, Statistics, and Computer
Science, Marquette University
Milwaukee, Wisconsin 53201, USA
Phone: 414-288-5222, Fax: 414-288-5472
Mohammad Zulkernine
School of Computing, Queens University
Kingston, Ontario
Canada K7L 3N6
Tel: (613) 533-2837, Fax: (613) 533-6513

Program Committee Members

Jalal Al-Muhtadi
King Saud University, Saudi Arabia
Doo Hwan Bae
KAIST, Korea
Umesh Bellur
IIT Bombay, India
Ying Cai
Iowa State University, USA
William Chu
TungHai University, Taiwan
Tadashi Dohi
Hiroshima University, Japan
Stephan Eidenbenz
Los Alamos Nat. Lab, USA
Antonio Mana Gomez
University of Malaga, SPAIN
Neelam Gupta
University of Arizona, USA
Christian Hauser
University of Stuttgart, Germany
Raquel Hill
Indiana University, Bloomington, USA
Andreas Holzinger
University of Graz, Austria
Patrick C. K. Hung
Univ. of Ontario Inst. of Tech., Canada
Min-Shiang Hwang
National Chung Hsing Univ., Taiwan
Anwar Haque
Bell Canada, Hamilton, Canada
Sahra Sedigh-Ali
Univ. of Missouri at Rolla, USA
Vana Kalogeraki
University of California, Riverside, USA
Sozo Inoue
Kyushu Univ, Japan
Gour Karmakar
Monash University, AustraliaTom Karygiannis
Djamel Khadraoui
CRP Henri Tudor, Luxembourg
Mujtaba Khambatti
Microsoft Corporation, USA
Gopi Kolli
Intel Corporation, USA
Zakaria Maamar
Zayed University, UAE
Qusay H. Mahmoud
University of Guelph, Canada
Bob Mayo
Compaq's Western Research Lab. USA
Kiran Mudiam
Motorola Corporation, USA
Nanjangud C Narendra
IBM Corporation , India
Mukesh Singhal
Univ. of Kentucky, USA
Wensheng Zhang
Iowa State University, USA
George Roussos
University of London, UK
Achilles Kameas
Hellenic Open University, Greece
Miroslav Velev
Consultant, USA
Stephen Weis
Wang Yu
Auburn University, USA
Taieb Znati
University of Pittsburgh, USA


For updated information, please refer to or contact the Program Co-Chairs: or