posted by user: mich || 5433 views || tracked by 7 users: [display]

DEPEND 2010 : The Third International Conference on Dependability

FacebookTwitterLinkedInGoogle

Link: http://www.iaria.org/conferences2010/ComDEPEND10.html
 
When Jul 18, 2010 - Jul 25, 2010
Where Venice/Mestre, Italy
Submission Deadline Mar 3, 2010
Notification Due Apr 15, 2010
Final Version Due Apr 20, 2010
Categories    dependability   security   fault tolerance
 

Call For Papers

The Third International Conference on Dependability

DEPEND 2010

July 18 - 25, 2010 - Venice/Mestre, Italy

Call for Papers

Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-line transactions), or refinery& chemical systems rely on networked communication and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detection, or maintenance that are complementary to and interact with the former ones.

With large scale and complex systems, their parts expose different static and dynamic features that interact with each others; some systems are more stabile than others, some are more scalable, while others exhibit accurate feedback loops, or are more reliable or fault-tolerant.

Inter-system dependability and intra-system feature dependability require more attention from both theoretical and practical aspects, such as a more formal specification of operational and non-operational requirements, specification of synchronization mechanisms, or dependency exception handing. Considering system and feature dependability becomes crucial for data protection and recoverability when implementing mission critical applications and services.

Static and dynamic dependability, time-oriented, or timeless dependability, dependability perimeter, dependability models, stability and convergence on dependable features and systems, and dependability control and self-management are some of the key topics requiring special treatment. Platforms and tools supporting the dependability requirements are needed.

The international conference on dependability, DEPEND 2010, is based on the positive participation and feedback at DEPEND 2008 workshop and DEPEND 2009 conference that addressed new approaches dealing with today's limitations and potential solutions.

As a particular case, design, development, and validation of tools for incident detection and decision support became crucial for security and dependability in complex systems. It is challenging how these tools could span different time scales and provide solutions for survivability that range from immediate reaction to global and smooth reconfiguration through policy based management for an improved resilience. Enhancement of the self-healing properties of critical infrastructures by planning, designing and simulating of optimized architectures tested against several realistic scenarios is also aimed.

To deal with dependability, sound methodologies, platforms, and tools are needed to allow system adaptability. The balance dependability/adaptability may determine the life scale of a complex system and settle the right monitoring and control mechanisms. Particular challenging issues pertaining to context-aware, security, mobility, and ubiquity require appropriate mechanisms, methodologies, formalisms, platforms, and tools to support adaptability.

Improvement of the risk and crisis management in critical infrastructures is achieved by the design of new models, countermeasures, and incident management tools. These new models will help to mitigate the cascading and escalading effects induced by different kind of dependencies present in communication and information systems. Development of decision support tools for critical infrastructures should be validated by scenarios based on different case studies.

We are looking for contributions on the actual trends in coping with these new challenges within the research community and industry. We expect some lessons learnt and description of the results coming from different R&D projects (e.g., like ones in the EC 6th Framework Program), or any other worldwide initiatives. We hope we will be able to identify the gaps between the needs and today's available solutions along with new challenges and potential for future directions.

DEPEND 2010 will provide a forum for detailed exchange of ideas, techniques, and experiences with the goal of understanding the academia and the industry trends related to the new challenges in dependability on critical and complex information systems.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.

Dependability facets
Fundamentals on dependability
Formalisms for dependability
Managing and control in dependable systems
Inter-system and intra-system dependability
Operational and non-operational requirements
Software and hardware dependability
Dependability design and specification
Synchronization mechanisms and dependency exception handing
Data protection, recoverability, fault-tolerance
Trust and dependability
Static and dynamic dependability
Time-oriented or time-agnostic dependability
Dependability perimeter and dependability models
Stability and convergence on dependable features and systems
Dependability discovery
Dependability control and self-management
Dependability degradation of running software and services

Adaptability and (self)adaptability
Fundamental models and adaptability mechanisms
Principles of (self)adaptability
Adaptive replication models and protocols
Adaptable structures and behaviors
Context-aware adaptability
Perceived dependability and adaptability
Adaptive and reflexive models and protocols
Management and control of (self)adaptable systems
Platforms and tool supporting (self)adaptability
Autonomic and autonomous adaptation

Adaptability and dependability
Dependability and adaptability for functional and non-functional features
Adaptability and dependability gap
Adaptability and dependability as complementing features
Context-aware adaptable and dependable design
Inter- and intra-systems transactions
Enforcing mechanisms for application level fault tolerance
Explicit and implicit control of quality of service and contracts
Dependability and adaptability in cloud and autonomic computing
Verification and validation of highly adaptable and dependable systems
Scalability aspects in dependable and adaptable systems
Research projects and topics on dependability and adaptability
Standards on system dependability and adaptability

Dependability and security
Integration of security, dependability, and adaptability concepts
Building and preserving scalable, secure and resilient architectures
Security models/architectures and threat models
Trade-off and negotiation of dependability and security properties
Dependability modeling and dynamic management policies
Verification and validation (including model checking) of dependable software architectures
Real time detection and recovery capabilities against intrusions, malfunctions and failures
Redundancy and reconfiguration architectures
Integrated response architectures
Planning of optimal configurations for anticipated operational modes
Modeling of networks and Information Systems
Simulation of modeled configurations
Fast reconfiguration with priority to critical services
Incident (including intrusion) detection and quick containment

Trust and system dependability
Semantics and models of trust
Dynamics of trust
Trust negotiation and management
Trusted systems from untrusted parts
Trust-based secure architectures
Trust metrics assessment and threat analysis
Trust in peer-to-peer and open source systems
Trust in mobile networks
Trust management, reputation management, and identity management
Trust, security, and dependability

Dependability, adaptability, and new technologies
Dependability and adaptability in service oriented architectures
Principles for adaptive and dependable distributed systems
Dependability and adaptability in P2P and overlay systems
Middleware protocols and mechanisms to support adaptability and dependability
Adaptability and dependability in mobile and pervasive systems
Service composition in highly dependable and adaptable environments
Dynamic, loosely-coupled, and ad-hoc environments
Group membership services in failure scenarios with network partitions
Social networks and dependability in dynamic communities
Cross-organization heterogeneity
Aerospace system dependability
Dependable software for life critical applications

INSTRUCTION FOR THE AUTHORS

Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.

Publisher: CPS (see: http://www2.computer.org/portal/web/cscps/)
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI’s Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index

Important deadlines:
Extension to March 3 granted as a result of a large number of requests for extra time
Submission (full paper) February 20, 2010 March 3, 2010
Notification March 30, 2010
Registration April 15, 2010
Camera ready April 20, 2010

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.

Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.

Your paper should also comply with the additional editorial rules.

Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Poster Forum

Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.

For more details, see the Poster Forum explanation page.

Work in Progress

Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.

For more details, see the Work in Progress explanation page

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre@iaria.org.

Tutorials

Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petre@iaria.org

Panel proposals:

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.

For more information, petre@iaria.org

Workshop proposals

We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre@iaria.org.

Related Resources

JSS SI: AI testing and analysis 2024   [JSS - Elsevier] Special Issue on Automated Testing and Analysis for Dependable AI-enabled Software and Systems
PRDC 2024   29th IEEE Pacific Rim International Conference on Dependable Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DADS 2025   ACM Dependable, Adaptive, and Secure Distributed Systems
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
EDCC 2025   20th European Dependable Computing Conference
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
LADC 2024   Latin-American Symposium on Dependable and Secure Computing
DADS 2024   ACM Dependable, Adaptive, and Secure Distributed Systems