posted by user: yamaki || 5142 views || tracked by 5 users: [display]

DTWD 2013 : International Workshop on Dependable and Trustworthy Web and Distributed Information Systems

FacebookTwitterLinkedInGoogle

Link: http://sitis-conf.org/en/dependable-and-trustworthy-distributed-information-systems-dtdi2013.php?Preview=ok
 
When Dec 2, 2013 - Dec 5, 2013
Where Kyoto, Japan
Submission Deadline Sep 23, 2013
Notification Due Oct 10, 2013
Final Version Due Oct 20, 2013
Categories    security   information system
 

Call For Papers

CALL FOR PAPERS

DTWD 2013 - International Workshop on Dependable and Trustworthy
Web and Distributed Information Systems

COLLOCATED WITH:
The 9th International Conference on SIGNAL IMAGE
TECHNOLOGY & INTERNET BASED SYSTEMS SITIS 2013,
Terrsa Conference Center, Kyoto, Japan,
2-5 December 2013
http://www.sitis-conf.org/

This workshop is held in cooperation with IPSJ SIG on Security
Psychology and Trust.


SCOPE OF THE WORKSHOP:

Today, individual end users as well as organizations like companies
and countries face the increasing scale and complexity of information
systems connected by networks. This is due to a variety of causes such
as the spread of the Internet and distributed computer systems, the
rapid increase of personal mobile devices like laptops, smart phones
and tablets in their number and variety, the emergence of the
"Internet of Things" brought about by the advance of embedded systems,
ad-hoc networks and LSI processing technology, and the advent of
large-scale computing environment like cloud computers and high
performance computing systems. Services and devices are
interconnected and interdependent, and the design, the implementation
and the management of such a system is almost impossible without
considering the existence of other systems that are or will be
connected to it.

The dependability of such interconnected and interdependent
information systems is based on that of individual devices and
services. And, it is crucial to know how dependability of the whole
system is achieved through that of elemental systems. Also, today's
Internet and ubiquitous computing environments include autonomous
information systems and services which are owned by different people
and organizations for different purposes. They are connected via
communication links to realize complex information services which are
provided to various users and clients. Individual service providers
and users have to determine whether other subjects that they interact
with are trustworthy or not.

The aim of this workshop is to provide an opportunity for participants
to exchange ideas and to share experiences on the interconnected and
interdependent systems that consist of autonomous individual systems
to study dependability and trust in such systems.

TOPICS OF INTEREST:
Topics of interest of the workshop include but are not limited to:
- Architecture and design of dependable systems
- Metrics to quantify dependability and security
- Benchmarking of dependability and security
- Verification and validation for dependability and security evaluation
- Requirement analysis for dependable and secure systems
- Design of dependable and secure systems
- Implementation of dependable and secure systems
- Theoretical study on dependability
- Trust and reputation management
- Metrics to quantify trust and reputation
- Management of credentials and authorization
- Risk and trust
- Authorization models, policies and protocols
- Theoretical study on trust and reputation
- Economical aspects and mechanism design of trust management
- Threats against dependability and trustworthiness of information systems
- Architecture and system design for security of interconnected systems
- Security of interconnected systems
- Dependability of Web applications and Web services
- Cross domain security of Web-based systems
- Dependability of ad-hoc networks
- Security of ad-hoc networks




IMPORTANT DATES:
Paper Submission: September 23, 2013 (midnight, Pacific Standard Time)
Authors’ notification: October 13, 2013
Final camera versions due: October 20, 2013
Authors’ registration: October 20, 2013

SUBMISSION GUIDELINES
All submissions should be in IEEE conference style and PDF format.
Papers may not exceed 8 pages. Two extra pages can be purchased. Paper
submission will only be online via: Easy Chair
(http://www.easychair.org/conferences/?conf=sitis2013 ) The online
system will be used to handle and process all papers and to prepare
for the final proceedings. All submitted papers will be carefully
evaluated based on originality, significance, technical soundness, and
clarity of expression by at least two reviewers. The organizers will
examine the reviews and make final paper selections. More details
about the submission process can be found on the conference website.

PUBLICATION
Accepted papers will be included in the conference proceedings and
published by IEEE Computer Society and referenced in IEEE explore and
major indexes. The proceedings will be available at the
conference. Extended version of selected accepted papers will be
considered for publication in major journals.

REGISTRATION
At least one author of each accepted paper must register for the workshop.
Registration must be done on the SITIS website at the time when the author sends
the camera-ready copy of the accepted paper to the workshop chair.
Workshop registration fee is determined by SITIS. A single registration for the
workshop or the conference allows to attend both events.

CHAIR
Hirofumi Yamaki, Tokyo Denki University, Japan

CO-CHAIR
Yuko Murayama, Iwate Prefectural University, Japan

PROGRAM COMMITTEE
Hirofumi Yamaki, Tokyo Denki University, Japan
Setsuo Tsuruta, Tokyo Denki University, Japan
Hiroshi Fujikawa, Pacific Brain Co., Ltd, Japan
Takashi Onoyama, Hitachi Solutions, Japan
Hajime Shimada, Nagoya University, Japan
Koichi Asakura, Daido University, Japan
Katsuhide Fujita, Tokyo University of Agriculture and Technology, Japan
Shinpei Kato, Nagoya University, Japan
Yuko Murayama, Iwate Prefectural University, Japan
Yuu Nakajima, Toho University, Japan

CONTACT:
dtwd2013-contact_at_ymklab.net (Replace _at_ with @)

Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSITEC 2025   11th International Conference on Computer Science, Information Technology
SAI 2025   14th International Conference on Soft Computing, Artificial Intelligence and Applications
IJIBM 2025   IJIBM 2025 : Call For Papers - International Journal of Information, Business and Management
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ISKE--SCI 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies