| |||||||||
DASC 2011 : 9th IEEE International Conference on Dependable, Autonomic and Secure ComputingConference Series : Dependable Autonomic and Secure Computing | |||||||||
Link: http://www.swinflow.org/confs/dasc2011 | |||||||||
| |||||||||
Call For Papers | |||||||||
As computer systems become increasingly large and complex, their Dependability, Security and Autonomy play critical role at supporting next-generation science, engineering, and commercial applications. These systems consist of heterogeneous software/hardware/network components of changing capacities, availability, and in varied contexts. They provide computing services to large pools of users and applications, and thus are exposed to a number of dangers such as accidental/deliberate faults, virus infections, malicious attacks, illegal intrusions, and natural disasters etc. As a result, too often computer systems fail, become compromised, or perform poorly and therefore untrustworthy. Thus, it remains a challenge to design, analyze, evaluate, and improve the dependability and security for a trusted computing environment. Trusted computing targets computing and communication systems as well as services that are autonomous, dependable, secure, privacy protect-able, predictable, traceable, controllable, assessable and sustainable.
The scale and complexity of information systems evolve towards overwhelming the capability of system administrators, programmers, and designers. This calls for the autonomic computing paradigm, which meets the requirement of self-management by providing self-optimization, self-healing, self-configuration, and self-protection. As a promising means to implement dependable and secure systems in a self-managing manner, autonomic computing technology needs to be further explored. On the other hand, any autonomic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trusted and autonomic computing and communications need synergistic research efforts covering many disciplines, ranging from computer science and engineering, to the natural sciences to the social sciences. It requires scientific and technological advances in a wide variety of fields, as well as new software, system architectures, and communication systems that support the effective and coherent integration of the constituent technologies. Topics DASC2011 is the second conference event following DASC2009 (December 2009, Chengdu, China) after the merger of the successful DASC symposium series previously held as RAMPDS-05 (July 2005, Fukuoka, Japan), DASC-06 (September 2006, Indianapolis, USA), DASC-07 (September, 2007, Columbia, MD, USA), and the successful SecUbiq symposium series, previously held as SecUbiq-05 (December 2005, Nagasaki, Japan), SecUbiq-06 (August 2006, Seoul, Korea), SecUbiq-07 (December 2007, Taipei, Taiwan) and SecUbiq-08 (December 2008, Shanghai, Shanghai). DASC2011 is to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. Topics of interest include, but are not limited to: Autonomic Computing Theory, Models, Architectures and Communications Dependable Automatic Control Techniques and Systems Cloud Computing with Autonomic and Trusted Environment Dependability Models and Evaluation Algorithms Dependable Sensors, Devices, Electronic-Mechanical Systems, Optic-Electronic Systems, Embedded Systems, etc. Self-improvement in Dependable Systems Self-healing, Self-protection and Fault-tolerant Systems Hardware and Software Reliability, Verification and Testing Software Engineering for Dependable Systems Safety-critical Systems in Transportation, Power System, etc. Security Models and Quantifications Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, etc. Self-protection and Intrusion-detection in Security DRM, Watermarking Technology, IP Protection Context-aware Access Control Virus Detections and Anti-virus Techniques/Software Cyber Attack, Crime and Cyber War Human Interaction with Trusted and Autonomic Computing Systems Security, Dependability and Autonomic Issues in Ubiquitous Computing QoS in Communications and Services |
|