co-located with IEEE ICDCS 2016, Nara, Japan
Distributed computer networked systems and services have become a crucial infrastructure element for the organization of modern society. These networks and services are required to be more and more open and new technology is designed to facilitate the inter-operation between these networks composed of heterogeneous, communicating devices. Guaranteeing that they inter-operate securely has become a major concern for individuals, enterprises and governments. Since the environment may be potentially hostile and contain malicious components, it is crucial to define frameworks adapted to distributed systems to enforce security and privacy. By distributed systems, we mean all systems that are composed of more than one communicating device such as telecommunication networks, cloud computer environment, smart communities, internet of things, distributed operating systems and middleware, big data etc. The STAM workshop tries to answer how vulnerability, intrusions and attacks modeling can help users understand the occurrence of malicious behaviors in order to avoid them, and what are the advantages and drawbacks of the existing models.
The topics of interest include but are not restricted to: