posted by user: dongseong || 4124 views || tracked by 3 users: [display]

DSSO 2015 : The Second International Workshop on Dependability and Security of System Operation


When Sep 28, 2015 - Sep 28, 2015
Submission Deadline Jun 21, 2015
Notification Due Jul 19, 2015
Final Version Due Jul 29, 2015
Categories    security   dependability   devops   software

Call For Papers

The Second International Workshop on Dependability and Security of System Operation
(DSSO 2015)

Sept 28, 2015


System operation is about setting up or changing a target system and/or its environment for purposes such as installation, upgrade, or reconfiguration. A system operation process may be executed by scripts, operations tools, code (as in “infrastructure as code”), or humans, usually based on some specification. A large amount of system downtime is caused by failures during a planned system operation or an operator incorrectly responding to a small initial error.

With the rise of the Development-Operations (DevOps) and Continuous Deployment (CD) movements, the speed and frequency of system operation processes, the automation of these processes, and the possibility of concurrent and conflicting execution of several operations processes are all increasing. In the meantime, large-scale use of Infrastructure/Platforms as Services (IaaS/PaaS) and resource sharing in virtualisation introduce more uncertainties into the environment.

Dependability and security issues can come from anywhere in the process – the specification, the code/scripts/tools/human involved, the target system, or the environment. Failures need to be prevented, detected, diagnosed, recovered from, or tolerated in the context of system operation processes.

The goal of the workshop is to bring together researchers from academia and industry to discuss dependability and security issues of system operation and techniques to reduce the downtime caused by these issues. Topics include but are not limited to the following:
Architectures or systems impact on operations
Best practices and patterns in system operation
Canary testing and production environment testing
Dependability/Security in configuration management
Dependability/Security in disaster recovery and business continuity
Dependability/Security in Infrastructure as Code, Software Defined Infrastructure, Software Defined Networks
Dependability/Security in operating HPC or big data processing (e.g. Hadoop/Spark) clusters
Dependability/Security in release engineering, continuous build, integration, delivery, and deployment
Development-Operation (DevOps) process interactions
Experience reports and data analysis of real-world system operation
Error diagnosis and root cause analysis during system operation
Failure/Fault detection/prevention/tolerance during system operation
Test driven system operations
Tolerance of variability
Operation-related machine data collection, storage and analytics

Workshop paper submissions: June 21, 2015
Notification to authors: July 19, 2015
Camera-ready: July 29, 2015

The submission and review process will be done using EasyChair (

Submissions must be no longer than 6 pages (including everything) and adhere to the IEEE Computer Society 8.5"x11" two-column camera-ready format. The manuscript templates for MS Word and LaTeX can be found at the following link:

All papers will be peer-reviewed by at least 3 PC members and evaluated based on originality, technical quality and relevance to the workshop.

Organizing Committee

Ingo Weber
NICTA/University of New South Wales, Australia

Dong-Seong Kim
University of Canterbury, New Zealand

Wei Xu
Tsinghua University, China

Liming Zhu
NICTA/University of New South Wales, Australia

Program Committee (To Be Confirmed and More to Come)

Bram Abrams, Polytechnique Montreal, Canada
Javier Alonso, Duke University, US
Giuliano Casale, Imperial College London, UK
Marc Chiarini, MarkLogic Corp, US
Marcello Cinque, University of Naples Federico II, Italy
Dianming Hu, Baidu Inc., China
Qiang Fu, Microsoft, US
Eben Haber, IBM Research, US
Andre van Hoorn, University of Stuttgart, Germany
Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, US
Rick Kazman, SEI & Uni of Hawaii, US
Fumio Machida, NEC,Japan
Paulo Maciel, Federal University of Pernambuco, Brazil
Iulian Neamtiu, Univ. of California, Riverside, US
Eli Tilevich, Virginia Tech, US
Rajesh Vasa, Swinburne Uni., Australia
Michael Wahler, ABB Corporate Research, Switzerland
Eoin Woods, UBS, Canada
Xin Ye, DUT, China
Ding Yuan, Uni. of Toronto, Canada

Related Resources

RASPSS 2019   CCPE Special Issue on Recent Advance in Security and Privacy for Smart Society (RASPSS19)
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
RecSys 2019   13th ACM Conference on Recommender Systems
ACNS 2019   International Conference on Applied Cryptography and Network Security
QRS 2019   The 19th IEEE International Conference on Software Quality, Reliability, and Security
ACM--ICISDM--Ei and Scopus 2019   ACM--2019 3rd International Conference on Information System and Data Mining (ICISDM 2019)--Ei Compendex and Scopus
CCS 2019   26th ACM Conference on Computer and Communications Security
ACM DADS 2019   ACM Dependable, Adaptive, and Trustworthy Distributed Systems