posted by user: goeschka || 632 views || tracked by 1 users: [display]

ACM DADS 2022 : ACM Dependable, Adaptive, and Secure Distributed Systems

FacebookTwitterLinkedInGoogle

Link: https://www.dedisys.org/sac22/
 
When Apr 25, 2022 - Apr 29, 2022
Where Brno, Czech Republic
Submission Deadline Oct 15, 2021
Notification Due Dec 10, 2021
Final Version Due Dec 21, 2021
Categories    dependability   adaptivity   blockchain   microservices
 

Call For Papers

FINAL CALL FOR PAPERS
=====================

+----------------------------------------------------------------------------+
| 17th Track on Dependable, Adaptive, and Secure Distributed Systems (DADS) |
| of the 37th ACM Symposium on Applied Computing (SAC'22) |
+----------------------------------------------------------------------------+

April 25 - 29, 2022
Brno, Czech Republic
http://www.dedisys.org/sac22/
https://www.sigapp.org/sac/sac2022/

Accepted papers will be published in the ACM conference proceedings and will be included in the ACM digital library.

Important Dates:
Paper submission: October 15, 2021
Author notification: December 10, 2021
Camera-ready copies: December 21, 2021

Authors are invited to submit original work not previously published, nor currently submitted elsewhere. Authors submit full papers in pdf format using the link to the submission site at http://www.dedisys.org/sac22/. Authors are allowed up to 10 pages, but with more than 8 pages in the final camera ready, there will be a charge of 80USD per extra page.

Call details
============
While computing is provided by the cloud and services increasingly pervade our daily lives, dependability, adaptiveness and security become a cornerstone of the information society. Unfortunately, most innovative systems and applications (Internet of Things, Industrial IoT, Smart Environments, Mashups, NewSQL) suffer from a lack of dependability and security, which is fueled by global scale, mobility and heterogeneity, as well as the demand for resource awareness, green computing, and increasing cost pressure.

Among technical factors, software development methods, tools, and techniques contribute to dependability and security, as defects in software products and services may lead to failure and also provide typical access for malicious attacks. In addition, there is a wide variety of fault and intrusion tolerance techniques available, including persistence provided by databases, redundancy and replication, group communication, transaction monitors, reliable middleware, cloud infrastructures, light-weight virtualization (docker), fragmentation-redundancy-scattering, and trustworthy service-oriented and microservice architectures with explicit control of quality of service properties and monitoring of service level agreements.

Furthermore, adaptiveness is envisaged in order to react to observed, or act upon expected changes of the system itself, the context/environment (e.g., resource variability or failure/threat scenarios) or users' needs and expectations. Provided without explicit user intervention, this is also termed autonomous behavior or self-properties, and often involves monitoring, diagnosis (analysis, interpretation), and reconfiguration (repair). In particular, adaptation is also a means to achieve dependability and security in a computing infrastructure with dynamically varying structure and properties and can itself be provided as a service (Control-as-a-service).

Topics of interest
==================
* Dependable, Adaptive, and Secure Distributed Systems (DADS)
* Architectures, architectural styles, and middleware for DADS
* Protocols for DADS
* Modeling, design, and engineering of DADS
* Foundations and formal methods for DADS
* Applications of DADS
* Evaluations, testing, benchmarking, and case studies of DADS
* Holistic aspects of DADS

Track program co-chairs
=======================
Karl M. Goeschka, Vienna University of Technology (Austria)
(main contact: dads@dedisys.org)
Matti Hiltunen, AT&T Labs (USA)
Rui Oliveira, Universidade do Minho (Portugal)

Program committee
=================
Filipe Araujo, University of Coimbra (Portugal)
Claudio Agostino Ardagna, University of Milan (Italy)
Mikael Asplund , Linköping University (Sweden)
Jean Bacon, University of Cambridge (UK)
Harun Baraki, Universität Kassel (Germany)
Alberto Bartoli, University of Trieste (Italy)
Alysson Bessani, Universidade de Lisboa (Portugal)
Stefan Beyer, Oak Security (Germany)
Andrea Bondavalli, University of Florence (Italy)
Antonio Casimiro, Universidade de Lisboa (Portugal)
Paulo Coelho, Federal University of Uberlandia (Brazil)
Mauro Conti, Universita di Padova (Italy)
Gianpaolo Cugola, Politecnico di Milano (Italy)
Shujie Cui, Imperial College (New Zealand)
Rogerio De Lemos, University of Kent (UK)
Antonella Del Pozzo, CEA - LIST, Saclay (France)
Felicita Di Giandomenico, ISTI-CNR, Pisa (Italy)
Naranker Dulay, Imperial College London (UK)
Nikolaos Georgantas, INRIA (France)
Vincenzo Gulisano, Chalmers University (Sweden)
Zhe Huang, AT&T (USA)
Alexandre Huff, Federal Technological University of Parana (Brazil)
Shanshan Jiang, SINTEF (Norway)
Nesrine Kaaniche, Polytechnic Institute of Paris (France)
Ferhat Khendek, Concordia University (Canada)
Mikel Larrea, Euskal Herriko Unibersitatea (Spain)
Michaël Lauer, LAAS-CNRS, Toulouse (France)
Mark Little, JBoss (UK)
István Majzik, Budapest UTE. (Hungary)
Odorico Mendizabal, Federal University of Santa Catarina (Brazil)
Matteo Migliavacca, University of Kent (UK)
Shivakant Mishra, University of Colorado (USA)
Gero Mühl, University of Rostock (Germany)
Francesc Daniel Muñoz-Escoí, UP Valencia (Spain)
Jose Pereira, Universidade do Minho (Portugal)
Barry Porter, Lancaster University (UK)
Luís Rodrigues, INESC-ID/IST (Portugal)
Luigi Romano, University of Naples (Italy)
Romain Rouvoy, INRIA (France)
Alirio Sá, Federal University of Bahia (Brazil)
Valerio Schiavoni, Université de Neuchâtel (Switzerland)
Elad Schiller, Chalmers University (Sweden)
Marjan Sirjani, Malardalen University (Sweden)
Stefan Tai, Information Systems Engineering, TU Berlin (Germany)
Matheus Torquato, University of Coimbra (Portugal)
Elena Troubitsyna, Åbo Akademi University (Finland)
Eddy Truyen, Katholieke Universiteit Leuven (Belgium)
Luis Veiga, Technical University of Lisbon (Portugal)
Ricardo Vilaça, Universidade do Minho (Portugal)
Roman Vitenberg, University of Oslo (Norway)
Nicola Zannone, Technical University of Eindhoven (Netherlands)

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
ACM BSCI 2022   The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure
SoCAV 2022   2022 International Symposium on Connected and Autonomous Vehicles (SoCAV 2022)
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing
IJMNCT 2022   International Journal of Mobile Network Communications & Telematics
ASE 2022   37th IEEE/ACM International Conference on Automated Software Engineering
IEEE COINS 2022   BCIOT - Special Track on Blockchain and Internet of Things (IoT)
ESEC/FSE 2022   The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering
ACM--ICDLT--Ei, Scopus 2022   ACM--2022 6th International Conference on Deep Learning Technologies (ICDLT 2022)--Ei Compendex, Scopus
ADCO 2022   9th International Conference on Advanced Computing