posted by user: dongseong || 3832 views || tracked by 3 users: [display]

DSSO 2015 : The Second International Workshop on Dependability and Security of System Operation

FacebookTwitterLinkedInGoogle

Link: http://ssrg.nicta.com.au/Events/conferences/dsso-15/
 
When Sep 28, 2015 - Sep 28, 2015
Where MONTREAL, QUEBEC, CANADA
Submission Deadline Jun 21, 2015
Notification Due Jul 19, 2015
Final Version Due Jul 29, 2015
Categories    security   dependability   devops   software
 

Call For Papers

The Second International Workshop on Dependability and Security of System Operation
(DSSO 2015)

MONTREAL, QUEBEC, CANADA
Sept 28, 2015
In conjunction with 34TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS(SRDS 2015).

GOAL

System operation is about setting up or changing a target system and/or its environment for purposes such as installation, upgrade, or reconfiguration. A system operation process may be executed by scripts, operations tools, code (as in “infrastructure as code”), or humans, usually based on some specification. A large amount of system downtime is caused by failures during a planned system operation or an operator incorrectly responding to a small initial error.

With the rise of the Development-Operations (DevOps) and Continuous Deployment (CD) movements, the speed and frequency of system operation processes, the automation of these processes, and the possibility of concurrent and conflicting execution of several operations processes are all increasing. In the meantime, large-scale use of Infrastructure/Platforms as Services (IaaS/PaaS) and resource sharing in virtualisation introduce more uncertainties into the environment.

Dependability and security issues can come from anywhere in the process – the specification, the code/scripts/tools/human involved, the target system, or the environment. Failures need to be prevented, detected, diagnosed, recovered from, or tolerated in the context of system operation processes.

The goal of the workshop is to bring together researchers from academia and industry to discuss dependability and security issues of system operation and techniques to reduce the downtime caused by these issues. Topics include but are not limited to the following:
Architectures or systems impact on operations
Best practices and patterns in system operation
Canary testing and production environment testing
Dependability/Security in configuration management
Dependability/Security in disaster recovery and business continuity
Dependability/Security in Infrastructure as Code, Software Defined Infrastructure, Software Defined Networks
Dependability/Security in operating HPC or big data processing (e.g. Hadoop/Spark) clusters
Dependability/Security in release engineering, continuous build, integration, delivery, and deployment
Development-Operation (DevOps) process interactions
Experience reports and data analysis of real-world system operation
Error diagnosis and root cause analysis during system operation
Failure/Fault detection/prevention/tolerance during system operation
Test driven system operations
Tolerance of variability
Operation-related machine data collection, storage and analytics
PAPER SUBMISSION AND PUBLICATION

Workshop paper submissions: June 21, 2015
Notification to authors: July 19, 2015
Camera-ready: July 29, 2015

The submission and review process will be done using EasyChair (https://www.easychair.org/conferences/?conf=dsso2015).

Submissions must be no longer than 6 pages (including everything) and adhere to the IEEE Computer Society 8.5"x11" two-column camera-ready format. The manuscript templates for MS Word and LaTeX can be found at the following link:
http://www.ieee.org/conferences_events/conferences/publishing/templates.html

All papers will be peer-reviewed by at least 3 PC members and evaluated based on originality, technical quality and relevance to the workshop.


Organizing Committee

Ingo Weber
NICTA/University of New South Wales, Australia

Dong-Seong Kim
University of Canterbury, New Zealand

Wei Xu
Tsinghua University, China

Liming Zhu
NICTA/University of New South Wales, Australia

Program Committee (To Be Confirmed and More to Come)

Bram Abrams, Polytechnique Montreal, Canada
Javier Alonso, Duke University, US
Giuliano Casale, Imperial College London, UK
Marc Chiarini, MarkLogic Corp, US
Marcello Cinque, University of Naples Federico II, Italy
Dianming Hu, Baidu Inc., China
Qiang Fu, Microsoft, US
Eben Haber, IBM Research, US
Andre van Hoorn, University of Stuttgart, Germany
Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, US
Rick Kazman, SEI & Uni of Hawaii, US
Fumio Machida, NEC,Japan
Paulo Maciel, Federal University of Pernambuco, Brazil
Iulian Neamtiu, Univ. of California, Riverside, US
Eli Tilevich, Virginia Tech, US
Rajesh Vasa, Swinburne Uni., Australia
Michael Wahler, ABB Corporate Research, Switzerland
Eoin Woods, UBS, Canada
Xin Ye, DUT, China
Ding Yuan, Uni. of Toronto, Canada

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJE 2017   International Journal of Education (IJE)
USENIX-Security 2018   27th USENIX Security Symposium
HPDC 2018   The 27th International ACM Symposium on High-Performance Parallel and Distributed Computing (HPDC'18)
eCrime 2018   13th Symposium on Electronic Crime Research
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
ICISDM--IEEE Xplore, Ei and Scopus 2018   2018 2nd International Conference on Information System and Data Mining (ICISDM 2018)--IEEE Xplore, Ei and Scopus
SCSSS 2018   6th Scandinavian Conference System and Software Safety
CCSEA 2018   8th International Conference on Computer Science, Engineering and Applications