This conference track brings the opportunity for researchers and developers from industry and the academic world to report the state of the art and exchange ideas about the support that should be provided in order to enforce confidentiality, security and reliability on the next generation of software technologies. Such a support will enhance the level of quality and of user trust on services involving collaboration with unknown remote parties.

    Nowadays widespread use of small, smart devices, such as smart cards, phones, and tablets, connected by the ubiquitous public Internet network, enable us to easily access a vast range of useful services. Such devices allow people to perform every day activities that either play a role in a collaborative task or are actually supported by some real-time or asynchronous collaboration technology. Example services are the trading of goods, remote writing or signing of digital documents, joining social networks or work groups, remotely locating someone/something, and even services improving our ability to observe/control the environment around us.

    In this context, applications that hold or exchange sensitive user data, like i.e. ATM cards storing security pin-codes, or healthcare applications using biometric data, need special protection against software failures or malicious behavior of downloaded code, that may expose the user to highly undesired consequences, such as threats to confidentiality and even financial or health danger.

    This is even more true since the trend is indeed towards integration, that is, not to have many specialized access devices but a single, multi-purpose host handling many (or all) kinds of user services and its related data together, even though with limited computing resources, such as any small device hosting a Java or .Net run-time environment.

    Moreover, inherent mobility and distribution of these small, open computing devices increases the complexity of the solutions to be adopted for handling secure and reliable execution of untrusted code, in order to ensure the data confidentiality strongly required by the applications.

     As a consequence, new and specially designed techniques  can be devised and applied in order to reach the goal of increasing the trust on such a distributed computing environment to a level of strength matching with the high strength of the above safety critical requirements.



          - Verification techniques tailored to embedded software
          - Novel testing and validation algorithms
          - Dependability assessment techniques
          - Model-based validation and testing techniques for security
          - Analysis of threats and countermeasures to the security of smart devices
          - Static and run-time techniques for byte-code level verification and validation
          - Validation testing of safety critical technologies
          - Validation of large-scale distributed applications
          - Software testing in multi-core environments
          - Risk-based approaches to software validation
          - Assessing security and robustness of applications 
          - New software architectures for securing software on collaboration devices
          - Performance analysis of security-related features
          - Performance and QoS testing
          - Testing and analysis tools

This Call for Papers is available for download as TXT file.
Please, feel free to distribute it over the Internet to whom might be interested.

Important Dates

Deadline for paper submission : Feb. 13th  Feb 28th, 2015
23rd IEEE WETICE-2013 conference: June 15-17, 2015

Submission Instructions

Papers should contain original contributions not published or submitted elsewhere, and references to related state-of-the art work. Please submit your papers in PDF format. Authors of accepted papers are expected to present their papers at the conference. Papers up to six pages (including figures, tables and references) can be submitted. Papers should follow the IEEE conference format, which is single-spaced, two columns, 10pt Times/Roman font. Papers should include a title, the name and affiliation of each author, an abstract of up to 150 words and no more than eight keywords. All submitted papers will be peer-reviewed by a minimum of three program committee members. The accepted papers will be published in the post-conference proceedings, and will be published by the IEEE Computer Society Press. Special Issues of several international journals have been programmed  with submission open by invitation only to authors of high quality papers. 
If you have further questions or remarks, please do not hesitate to contact the organizers.
Submission is open through the EasyChair system.

Conference Track Organizers and Commettee

Andrea Calvagna
Dipartimento di Matematica e Informatica
Universita' degli Studi di Catania - Italy
calvagna @ cs.unict.it

Emiliano Tramontana
Dipartimento di Matematica e Informatica
Universita' degli Studi di Catania - Italy
tramonta @ cs.unict.it

WETICE Conference

WETICE is an annual IEEE International conference on state-of-the-art research in enabling technologies for collaboration, consisting of a number of cognate conference tracks. The Proceedings are published by the IEEE CS Press and distributed at the conference. All published papers are refereed by the Scientific Review of Committee of each conference track. What sets WETICE apart from larger conferences is that the conference tracks are kept small enough to promote fruitful discussions on the latest technology developments, directions, problems, and requirements. Each track includes paper presentations and group discussions while the keynote sessions and summary of discussions take place in joint sessions.

Last Update feb 17 2015