posted by user: mich || 3603 views || tracked by 8 users: [display]

DEPEND 2008 : The First International Workshop on Dependability and Security in Complex and Critical Information Systems


When Aug 25, 2008 - Aug 31, 2008
Where Cap Esterel, France
Submission Deadline Apr 15, 2008
Notification Due May 19, 2008
Final Version Due Jul 5, 2008
Categories    dependable systems   dependability   security

Call For Papers

The First International Workshop on Dependability and Security in Complex and Critical Information Systems
August 25-31, 2008 - Cap Esterel, France

Call for Papers:

Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airlines, road), Health and emergency response rely on networked communication and information systems (CISs).

DEPEND 2008 workshop will address new approaches dealing with today's limitations and covering different complementary topics on these areas.

Design, development, and validation of tools for incident detection and decision support became crucial for security and dependability in complex systems. It is challenging how these tools could span different time scales and provide solutions for survivability that range from immediate reaction to global and smooth reconfiguration through policy based management for an improved resilience. Enhancement of the self-healing properties of critical infrastructures by planning, designing and simulating of optimized architectures tested against several realistic scenarios is also aimed.

Improvement of the risk and crisis management in critical infrastructures is achieved by the design of new models, countermeasures, and incident management tools. These new models will help to mitigate the cascading and escalading effects induced by different kind of dependencies present in CISs. Development of decision support tools for critical infrastructures should be validated by scenarios based on different case studies.

We are looking for contributions on the actual trends in coping with these new challenges within the research community. We expect some lessons learnt and description of the results coming from different R&D projects (e.g., like ones in the EC 6th Framework Program), or any other worldwide initiatives. We hope we will be able to identify the gaps between the needs and today's available solutions along with new challenges and potential for future directions.

The workshop will provide a forum for detailed exchange of ideas, techniques, and experiences with the goal of understanding the academia and the industry trends related to the new challenges in dependability and security in critical and complex information systems. Researchers, designers and administrators, product and service developers, and other interested persons from academia, industry, and the government are welcome and encouraged to participate with unpublished contributions in areas including, but not limited to:

Building and preserving scalable, secure and resilient architectures
Dependability modelling and dynamic management policies
Verification and validation (including model checking) of dependable software architectures
Real time detection and recovery capabilities against intrusions, malfunctions and failures
Redundancy and reconfiguration architectures
Integrated response architectures
Planning of optimal configurations for anticipated operational modes
Modelling of networks and Information Systems
Simulation of modelled configurations
Fast reconfiguration with priority to critical services
Incident (including intrusion) detection and quick containment

The DEPEND 2008 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index the papers with major indexes.

Important deadlines:

Submission deadline April 15, 2008
Notification May 19, 2008
Registration and camera ready June 5, 2008

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via the an automated submission system.

Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page.

Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference‚??s CD collection, together with the regular papers. Please send your presentations to and


Tutorials provide overviews of current high interest topics. Proposals can be for half or full day tutorials. Please send your proposals to

Panel proposals:

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies.

For more information, send emails to and

DEPEND 2008 Technical Program Committee

Antonio F. Gómez Skarmeta, University of Murcia, Spain
André Cotton, Thales Communication, France

+André Cotton, Thales Communication, France
+Wolfgang Fritsche, IABG, Germany
+Antonio F. Gómez Skarmeta, University of Murcia, Spain
+Antonio Lioy, Politécnico di Torino, Italy
+Javier López, Univ Malaga, Spain
+Fabio Martinelli, CNR, Italy
+Syed Naqvi, CETIC, Belgium
+Aljosa Pasic, ATOS Origin, Spain
+Patrick Radja, Advanced Communication and Security Programs, EADS, Europe
+Michel Riguidel, Ecole Nationale Supérieure des Télécommunications, France
+Reijo Savola, VTT Technical Research Centre of Finland - Oulu, Finland
+Neeraj Suri, TU_Darmstadt, Germany
+Daniel Vladusic, Xlab, Slovenia
+Wojciech Zamojski, Wroclaw University of Technology, Poland

Related Resources

CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
IJIBM 2022   Call For Papers - International Journal of Information, Business and Management
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
EAI SecureComm 2022   18th EAI International Conference on Security and Privacy in Communication Networks
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ICSS 2022   8th International Conference on Software Security
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)