posted by user: dongseong || 5120 views || tracked by 3 users: [display]

DSSO 2015 : The Second International Workshop on Dependability and Security of System Operation

FacebookTwitterLinkedInGoogle

Link: http://ssrg.nicta.com.au/Events/conferences/dsso-15/
 
When Sep 28, 2015 - Sep 28, 2015
Where MONTREAL, QUEBEC, CANADA
Submission Deadline Jun 21, 2015
Notification Due Jul 19, 2015
Final Version Due Jul 29, 2015
Categories    security   dependability   devops   software
 

Call For Papers

The Second International Workshop on Dependability and Security of System Operation
(DSSO 2015)

MONTREAL, QUEBEC, CANADA
Sept 28, 2015
In conjunction with 34TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS(SRDS 2015).

GOAL

System operation is about setting up or changing a target system and/or its environment for purposes such as installation, upgrade, or reconfiguration. A system operation process may be executed by scripts, operations tools, code (as in “infrastructure as code”), or humans, usually based on some specification. A large amount of system downtime is caused by failures during a planned system operation or an operator incorrectly responding to a small initial error.

With the rise of the Development-Operations (DevOps) and Continuous Deployment (CD) movements, the speed and frequency of system operation processes, the automation of these processes, and the possibility of concurrent and conflicting execution of several operations processes are all increasing. In the meantime, large-scale use of Infrastructure/Platforms as Services (IaaS/PaaS) and resource sharing in virtualisation introduce more uncertainties into the environment.

Dependability and security issues can come from anywhere in the process – the specification, the code/scripts/tools/human involved, the target system, or the environment. Failures need to be prevented, detected, diagnosed, recovered from, or tolerated in the context of system operation processes.

The goal of the workshop is to bring together researchers from academia and industry to discuss dependability and security issues of system operation and techniques to reduce the downtime caused by these issues. Topics include but are not limited to the following:
Architectures or systems impact on operations
Best practices and patterns in system operation
Canary testing and production environment testing
Dependability/Security in configuration management
Dependability/Security in disaster recovery and business continuity
Dependability/Security in Infrastructure as Code, Software Defined Infrastructure, Software Defined Networks
Dependability/Security in operating HPC or big data processing (e.g. Hadoop/Spark) clusters
Dependability/Security in release engineering, continuous build, integration, delivery, and deployment
Development-Operation (DevOps) process interactions
Experience reports and data analysis of real-world system operation
Error diagnosis and root cause analysis during system operation
Failure/Fault detection/prevention/tolerance during system operation
Test driven system operations
Tolerance of variability
Operation-related machine data collection, storage and analytics
PAPER SUBMISSION AND PUBLICATION

Workshop paper submissions: June 21, 2015
Notification to authors: July 19, 2015
Camera-ready: July 29, 2015

The submission and review process will be done using EasyChair (https://www.easychair.org/conferences/?conf=dsso2015).

Submissions must be no longer than 6 pages (including everything) and adhere to the IEEE Computer Society 8.5"x11" two-column camera-ready format. The manuscript templates for MS Word and LaTeX can be found at the following link:
http://www.ieee.org/conferences_events/conferences/publishing/templates.html

All papers will be peer-reviewed by at least 3 PC members and evaluated based on originality, technical quality and relevance to the workshop.


Organizing Committee

Ingo Weber
NICTA/University of New South Wales, Australia

Dong-Seong Kim
University of Canterbury, New Zealand

Wei Xu
Tsinghua University, China

Liming Zhu
NICTA/University of New South Wales, Australia

Program Committee (To Be Confirmed and More to Come)

Bram Abrams, Polytechnique Montreal, Canada
Javier Alonso, Duke University, US
Giuliano Casale, Imperial College London, UK
Marc Chiarini, MarkLogic Corp, US
Marcello Cinque, University of Naples Federico II, Italy
Dianming Hu, Baidu Inc., China
Qiang Fu, Microsoft, US
Eben Haber, IBM Research, US
Andre van Hoorn, University of Stuttgart, Germany
Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, US
Rick Kazman, SEI & Uni of Hawaii, US
Fumio Machida, NEC,Japan
Paulo Maciel, Federal University of Pernambuco, Brazil
Iulian Neamtiu, Univ. of California, Riverside, US
Eli Tilevich, Virginia Tech, US
Rajesh Vasa, Swinburne Uni., Australia
Michael Wahler, ABB Corporate Research, Switzerland
Eoin Woods, UBS, Canada
Xin Ye, DUT, China
Ding Yuan, Uni. of Toronto, Canada

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ISSSR 2025   The 11th IEEE International Symposium on System Security, Safety, and Reliability
ICONS 2025   The Twentieth International Conference on Systems
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
AGRIJ 2024   Agricultural Science: An International journal
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
SECRYPT 2025   22nd International Conference on Security and Cryptography