********************
SOFTWARE TECHNOLOGY
Agile Software
Engineering: AGILE SOFTWARE DEVELOPMENT MEETS TRADITIONAL SOFTWARE ENGINEERING
Over the last decade the pendulum has swung decidedly towards agile software development (from a more traditional engineering approach to software development). There are those who feel, however, that the pendulum has swung too far and needs to move back to more of a middle ground between the two approaches.
Agile software development (ASD) has seen enormous growth over the last decade since the announcement of the Agile Manifesto. There is no doubt that it has made a significant and lasting contribution to software development from project management to coding and testing practices and much more.
It is clearly also true that more than a half a century of research and practice in traditional software engineering (TSE) has produced significant findings and made a significant contribution to all aspects of software development. And yet, much of agile software development and many of those in the agile movement seem to ignore or reject traditional software engineering.
This minitrack focuses on research in the middle ground between traditional software engineering (TSE) and agile software development (ASD), or what we call agile software engineering (ASE). It will be an opportunity to present and discuss research that suggests and demonstrates a way to combine the best contributions of each approach (e.g. in practice, in methodologies, in education and training).
It will also accept research that may be critical of either or both approaches. It can do this because it is not committed entirely to either approach. It will also embrace innovative research that seeks to define an agile approach to software engineering (above and beyond the traditional iterative-and-incremental approach), including practices and methodologies.
This minitrack will also be a forum to present and discuss research related to the SEMAT (Software Engineering Method and Theory) initiative. SEMAT aims to find a core theory and method common to the two (and any other) approaches to software development.
Possible topics include (but are not limited to):
ο What is the essence of each approach (TSE and ASD) and are they compatible?
ο Defining agile software engineering (a middle ground between the two approaches)
ο When is a more agile approach and when is a more traditional approach most appropriate?
ο Critiques of agile software development and traditional software engineering
ο Agile modeling (particularly, for requirements, analysis and design)
ο The role of modeling in modern software development
ο Approaches to architecture in modern software development
ο Optimal iteration lengths in modern software development
ο Approaches to teams and team work in modern software development
ο Fitting software development into more waterfall business processes
ο Tools to support an agile approach to software engineering
ο Software Engineering Method and Theory (SEMAT)
ο Teaching a middle ground between traditional SE and agile software development
ο Methodologies for agile software engineering (i.e. that blend the approaches)
Ashey Aitken is a Senior Lecturer in the School of Information Systems at Curtin University of Technology in Perth, Australia. He has a PhD in Computer Science & Engineering from the University of New South Wales. He has also done professional training, consulting and software development in industry through his company Running Code Productions.
SUBMIT INQUIRIES TO:
Ashley Aitken
Curtin University of Technology,
Email: A.Aitken@Curtin.Edu.Au
Assurance Research for Dependable Software Systems
The following topics will be included in the minitrack:
Jim Alves-Foss is the director of the University of Idaho Center for Secure and Dependable Systems. Dr. Alves-Foss co-founded the center in 1997 in response to the growing need for information assurance education and research. In 1998 the center was recognized as one of the first seven National Centers of Academic Excellence in Information Assurance Education by the National Security Agency. As a researcher in high assurance systems, Dr. Alves-Foss has published over 90 refereed conference and journal papers, has mentored 15 PhD students to completion as well as dozens of MS students. Dr. Alves-Foss received his BS in Mathematics and Physics and Computer Science and his MS and PhD degrees in Computer Science, all from the University of California at Davis. He came to the University of Idaho in 1991 after completing his PhD and is now a full professor.
Richard Linger
is a Senior Research and Development Staff Member in the Cyberspace Sciences and Information Intelligence Research Group at Oak Ridge National Laboratory, where he leads research and development in software behavior computation for verification of smart grid software functionality and security. He previously served as manager of the CERT Survivable Systems Engineering Group at the Software Engineering Institute, Carnegie Mellon University. He directed research and development on Function Extraction (FX) technology for software behavior computation, with focus on application to software test & evaluation and to malware analysis. He also served as a member of the faculty at the CMU Heinz School of Public Policy and Management. At IBM, Linger partnered with Dr. Harlan Mills, IBM Fellow, to create Cleanroom Software Engineering technology for development of ultra-reliable software systems, including box-structure specification, function-theoretic design and correctness verification, and statistical usage-based testing for certification of software fitness for use. He has extensive experience in project management; system specification, architecture, design, verification, testing, and certification; software re-engineering and reverse engineering; and technology transfer and education. He has published three software engineering textbooks, 11 book chapters, and over 60 papers and journal articles. He is a member of the AIAA and ACM, and a senior member of the IEEE.Carol Woody is a senior member of the technical staff at the Software Engineering Institute. She leads a team of researchers addressing Cyber Security Engineering. Her current research is focused on cyber assurance and supply chain risk analysis. Woody has over 25 years of experience covering all aspects of software and systems planning, design, development, and implementation in large complex organizations. She holds a BS in mathematics from The College of William and Mary, an MBA with distinction from Wake Forest University, and a PhD in Information Systems from NOVA Southeastern University. Woody is a senior member of both IEEE and ACM.
SUBMIT INQUIRIES TO:
Richard Linger (primary contact)
Cyberspace Sciences and Information Intelligence Research Group
Email: LingerR@ornl.gov
Jim Alves-Foss, Director
University of Idaho
Email: jimaf@uidaho.edu
Carol Woody
Carnegie Mellon University
Digital Forensics Ð Education, Research, and Practice
This minitrack will bring together papers from academia and
practitioners that address current directions in digital forensics. Digital
forensics involves the use of software, computer science, software engineering,
and criminal justice procedures to explore and investigate digital media with
the objective of finding evidence to support a criminal or administrative case.
It involves the preservation, identification, extraction, and documentation of
computer or network evidence.
We solicit papers in the following areas:
Kara Nance is Professor and Chair of the Computer Science Department at the University of Alaska Fairbanks and runs a computer security consulting firm. Her research interests include digital forensics, data systems, network dynamics, visualization, and computer security. She is the founder and director of the Advanced Systems Security Education, Research and Training (ASSERT) Center, which is a multidisciplinary center to address computer security issues and provides an isolated networked computer environment suitable for computer security education, research, and training that is used by institutions around the world. She serves on a Senior-Executive Advisory Board for the Office of the Director of National Intelligence and is a frequent speaker on cybersecurity as it relates to national security.
Matt Bishop received his Ph.D. in computer science from Purdue University, where he specialized in computer security, in 1984. He was a research scientist at the Research Institute of Advanced Computer Science and was on the faculty at Dartmouth College before joining the Department of Computer Science at the University of California at Davis. His main research area is the analysis of vulnerabilities in computer systems, especially their origin, detection, and remediation. He is also active in the areas of network security, the study of denial of service attacks and defenses, policy modeling, software assurance testing, and formal modeling of access control. He is active in information assurance education, and is a charter member of the Colloquium on Information Systems Security Education. His textbook, Computer Security: Art and Science, was published in December 2002 by Addison-Wesley Professional. He teaches software engineering, machine architecture, operating systems, programming, and (of course) computer security.
Amelia Phillips is a graduate of the Massachusetts Institute of Technology with a BS degree in Astronautical Engineering and a BS in Archaeology. She is currently pursuing her PhD in Computer Security at the University of Alaska Fairbanks. After working as an engineer at the Jet Propulsion Laboratory and TRW, Amelia worked with e-commerce sites and began her training in computer forensics and investigations during the dot-com boom as credit card numbers were being stolen from website databases. She has designed certificate and AAS programs for community colleges in e-commerce, network security, computer forensics and data recovery. She is currently tenured at Highline Community College in Seattle, WA and is serving as the Chair of the Pure & Applied Science Division. She co-authored the textbook Guide to Computer Forensics and Investigations which is now in its fourth edition. She runs the program in Data Recovery/Computer Forensics for Highline Community College in Seattle.
SUBMIT INQUIRIES TO:
Kara Nance (Primary Contact)
University of Alaska at Fairbanks
Email: klnance@alaska.edu
Matt Bishop
University of California, Davis
Email: bishop@cs.ucdavis.edu
Amelia Phillips
Highline Community College
Email: aphillip@highline.edu
Introduction to Agile Software Development: Lean, Distributed, and Scalable
The track is open to research papers on multiple aspects of
agile methods, particularly those that bring best practices in knowledge
management and lean development to scalable, distributed, and outsourced Scrum,
eXtreme Programming (XP), and other agile practices.
Papers of interest include these topics:
Papers are particularly relevant when agile processes are shown to produce quantitative and qualitative benefits across multiple implementations.
SUBMIT INQUIRIES TO:
Jeff Sutherland
Scrum, Inc.
Email: jeff@scruminc.com
Open Movements: FLOSS, Open Contents, Open Access and Open Communities Secure Cloud Computing
(See Internet
Secure Cloud Computing
Cloud Computing offers SaaS, PaaS, and IaaS as cost effective
ways of doing computation. Initiatives by Governments as well as large and small
businesses are motivating the migration of localized data centers, and IT to
Internet Cloud Computing facilities. This rapid deployment of Cloud Computing
comes with a cost that can leave users open to vulnerabilities such as:
Disruptions that may shutdown 24x7 computation availability of essential
services since the concentration of government and or multiple businesses
resources at a single site is a convenient target for effective cyber-terrorist
attacks; Possible theft of Cloud resident software Intellectual Property and
confidential Personal Information; and the unwarranted invasions of user data
privacy because users and their data may reside in conflicting legal
jurisdictions.
This minitrack will be open to research and practitioner contributions alike
exploring the technical design issues as well as the solutions facing the
challenges of Secure Cloud Computing.
We have learned that while cost reduction is the major benefit of Cloud Computing, security is the salient deployment issue. Because Cloud Computing promises to provide low cost Cloud Computing that will be able to replace most of the computational and IT needs governments and the private sectors require, the security demands are enormous and the related technical research area is rich. In particular, the minitrack attempts to bring together computer science and industrial researchers, as well as software architects and implementers that are currently working in this area.
- Security of Public versus Private Cloud services
- Secure, virtual desktop deployment
- Preventing Virtual-Machine co-residency attacks
- Designing a secure Hyper-Visor
- Preventing Intellectual Property and Personal Information theft
- Monitoring, auditing Cloud Services
- Cloud Computing Digital forensics
- Guaranteeing "Five 9's" availability
- Methods to secure The Cloud against DDoS attacks
- Vaccinating PaaS and IaaS Clouds against software viruses
- Secure Cloud deployment of virtually accessible, confidential databases
- Cloud based identity management
- Data privacy and availability in Peer-to-Peer Clouds
- Customer migration from one Cloud provider to another
- Guaranteeing customer data storage remains in customer consistent legal jurisdictions
- Securing backup, archival and retrieval of customer data against virtual as well as physical attacks.
- Secure cloud interoperability and Service Level Agreements
- Rights and Policy Management in Cloud Computing and Services
- Governance, Risk and Compliance in Cloud Computing and Services
- Security in the Social Cloud of Things
- Ethical, social and legal issues in Cloud Computing
SUBMIT INQUIRIES TO:
William J. Yeager (Primary Contact)
Email: byeager@fastmail.fm
Ali Ghodsi
KTH/Royal Institute of Technology and Swedish Institute of Computer Science
Email: ali@sics.se
Jean-Henry Morin
University of Geneva - CUI
Email: Jean-Henry.Morin@unige.ch
Software Product Lines: Engineering, Services, and Management
Software has become the key asset for competitive products and services in all industries. Thus, competitiveness in software development, maintenance, and related services has become a concern for organizations. There are two primary strategies to deal with this concern: increasing the competitiveness (1) internally through methods such as the strategic acquisition, creation, and reuse of software assets or (2) externally by outsourcing software development, maintenance, and related services to third party service providers. A viable third strategy is to enact both strategies in parallel. This minitrack will focus on the first strategy but submissions dealing with the third strategy are very welcome as well.
This minitrack welcomes contributions to the mainstream product line body of knowledge. Authors with a strong software engineering focus are encouraged to relate their work with the relevant work (e.g., on agile methods) in the other minitracks of the Software Technology track. To help integrate new bodies of knowledge in product line research and practice, the minitrack especially welcomes contributions including but not limited to:
The minitrack is also interested in industrial experiences in product line engineering if they can be used to validate or challenge existing theories and/or create new theories relevant to the software product line engineering body of knowledge.
SUBMIT INQUIRIES TO:
Timo Kakola
University of JyvŠskylŠ
Email: timokk@jyu.fi
Software Testing and Internet Testbeds
Software testing is a complex, resource-intensive process that addresses properties including functionality, usability, security, and performance. The goal of this minitrack is to bring together researchers from all areas of testing and Internet testbeds to promote sharing and cross-pollination of promising methods and technologies. We will promote a testing discipline characterized by solid foundations and processes that can effectively address the scope and scale of the problem. This minitrack also encompasses other means to assess software; for example, code inspections and reviews and methods for verification and validation.
This minitrack addresses all aspects of the testing. The following topics will be included:
Luanne Burns received her M.S. in Computer Science and her
Ph.D. in Cognitive Science from Columbia University. Her work involved neural
networks and expert systems in education. She was a Research Staff Member at
IBM's Thomas J. Watson Research Center for 18 years. The main focus of her work
was on user interface design and implementation in the database, education, and
internet domains. Later she was a Senior Engineer at Carnegie Mellon's Software
Engineering Institute. Luanne is now a senior member of the technical staff
(Cyber Systems) at Johns Hopkins Applied Physics Lab (APL) in the Applied
Information Sciences Department. She is currently the Demonstration, Integration
and Test Lead for the National Cyber Range project at APL.
Ronald
Ostrenga is a senior staff member responsible the designing and implementing the Command and Control infrastructure for JHU/APL's implementation of the National Cyber Range. Previously, he was a Senior Research Scientist for Network Associates Laboratories (later McAfee Research) where he co-authored the "Justification and Requirements for a National DDoS Defense Technology Evaluation Facility,", paper that led to NSF and DHS funding and building the DETER Testbed. He has also co-authored the Tridentcom paper ÒExperience with DETER: A Testbed for Security ResearchÓ in March 2006. He supported DETER as a member of its executive committee and was an architect and a developer of that testbed. He has more than 25 years of experience in large networked system design, implementation and operations.Richard Linger is a Senior Research and Development Staff Member in the Cyberspace Sciences and Information Intelligence Research Group at Oak Ridge National Laboratory, where he leads research and development in software behavior computation for verification of smart grid software functionality and security. He previously served as manager of the CERT Survivable Systems Engineering Group at the Software Engineering Institute, Carnegie Mellon University. He directed research and development on Function Extraction (FX) technology for software behavior computation, with focus on application to software test & evaluation and to malware analysis. He also served as a member of the faculty at the CMU Heinz School of Public Policy and Management. At IBM, Linger partnered with Dr. Harlan Mills, IBM Fellow, to create Cleanroom Software Engineering technology for development of ultra-reliable software systems, including box-structure specification, function-theoretic design and correctness verification, and statistical usage-based testing for certification of software fitness for use. He has extensive experience in project management; system specification, architecture, design, verification, testing, and certification; software re-engineering and reverse engineering; and technology transfer and education. He has published three software engineering textbooks, 11 book chapters, and over 60 papers and journal articles. He is a member of the AIAA and ACM, and a senior member of the IEEE.
SUBMIT INQUIRIES TO:
Luanne Burns (Primary Contact)
Johns Hopkins University, Applied Physics Lab
Email: luanne.burns@jhuapl.edu
Ronald Ostrenga
Johns Hopkins University, Applied Physics Lab
Email: ronald.ostrenga@jhuapl.edu
Richard Linger
Cyberspace Sciences and Information Intelligence Research Group
Email: LingerR@ornl.gov
Virtualization: Environments, Research and Education
Virtualization has recently undergone revitalization due to increased system performance and the support for virtualization in commodity hardware. Industry is adopting virtualization to reduce operating costs and improve reliability. Academia is looking to improve experiential learning opportunities and building scalable computer laboratories. The resulting "race to the cloud" has brought to light some of the challenges associated with virtualization. In order for virtualization to realize its larger potential, it is important to investigate the following:
Areas of research for submitted papers may include, but not be limited to the following topics:
Brian Hay is an Assistant Professor in the Computer Science Department, and Director of the Advanced System Security Education, Research, and Training (ASSERT) Lab at the University of Alaska Fairbanks. He has designed and implemented several virtual labs, and focuses on virtualization in his current research. He is one of the PIs on the NSF-funded Remotely Accessible Virtualized Environments (RAVE) Project, which is working to increase accessibility to virtualized education environments.
Ron Dodge is an active duty Colonel in the Army and is an Associate Professor in the Electrical Engineering and Computer Science department at the United States Military Academy. He is the Associate Dean for Information and Education Technology and teaches operating systems and security courses. His current research focuses are information warfare, virtualization, security protocols, and performance planning and capacity management. He is a frequent speaker at national and international IA conferences. He is one of the PIs on the NSF-funded Remotely Accessible Virtualized Environments (RAVE) Project.
Vincent J. Nestler holds a Masters in the Art of Teaching from Columbia University, Teachers College as well as a Masters in Network Security from Capitol College in Laurel MD. He is currently a PhD Candidate at Idaho in the Instructional Design Program. His area of study is the use of virtualization in distance education and information assurance. He is the author of the Lab Manual to the textbook Principles of Computer Security, published by McGraw Hill and in its second edition. The book, since its 1st printing 5 years ago, has been based on the use of virtual machines as a learning platform.
SUBMIT INQUIRIES TO:
Brian Hay (primary contact)
University of Alaska Fairbanks
Email: brian.hay@alaska.edu
Ronald C Dodge, Jr.
United States Military Academy
Email: ronald.dodge@usma.edu
Vincent Nestler
University of Idaho
Email: nestlerv@mac.com
Wireless Networks
This minitrack is focused on the issues that arise in designing and building wireless networks, and on the applications of wireless networks in solving real-world challenges and connecting people and devices.
Technical issues are found in the protocol stack from the physical layer to the application layer, and include greater efficiency, security, scalability, the design and motivation of new systems, novel applications, better use of existing technology, energy efficiency of communications and use, regulatory issues, and in general, issues that are of concern when designing or building wireless networks. Often, technical solutions must be accompanied by relevant social, environmental, or economic considerations that may be essential to the success of the technology.
The following is a partial list of research topics of interest for this minitrack:
In general, this minitrack is expansive in welcoming submissions in any area related to wireless networks. Prospective authors are invited to contact the minitrack chairs if they seek more detailed guidance.
Edoardo Biagioni is an associate professor in the department of Information and Computer Sciences at the University of Hawaii at Manoa. His research interests include networking protocols, in particular routing and data transfer protocols for wireless sensor networks and wireless ad-hoc networks, and information assurance.
John McEachen is a professor in the Department of Electrical and Computer Engineering of the Naval Postgraduate School, Monterey, California. His research interests include managing routing in computer networks, wireless networking protocols, patternless intrusion detection, and steganographic communications.
Murali Tummala is a Professor of Electrical and Computer Engineering at the Naval Postgraduate School, Monterey, California, where he conducts research in wireless ad hoc and sensor networking, wireless communications, and signal processing.
SUBMIT INQUIRIES TO:
Edo Biagioni (Primary Contact)
University of Hawaii at Manoa
Email: esb@hawaii.edu
John McEachen
Naval Postgraduate School
Murali Tummala
Naval Postgraduate School
Email: mtummala@nps.edu