posted by organizer: goeschka || 5582 views || tracked by 5 users: [display]

ACM SAC DADS 2020 : ACM Dependable, Adaptive, and Secure Distributed Systems

FacebookTwitterLinkedInGoogle

Link: http://www.dedisys.org/sac20/
 
When Mar 30, 2020 - Apr 3, 2020
Where Brno, Czech Republic
Submission Deadline Sep 29, 2019
Notification Due Nov 24, 2019
Final Version Due Oct 9, 2019
Categories    dependability   security   blockchain   DAPPS
 

Call For Papers

FINAL CALL FOR PAPERS
=====================

+----------------------------------------------------------------------------+
| 15th Track on Dependable, Adaptive, and Secure Distributed Systems (DADS) |
| of the 35th ACM Symposium on Applied Computing (SAC'20) |
+----------------------------------------------------------------------------+

March 30 - April 3, 2020
Brno, Czech Republic
http://www.dedisys.org/sac20/
https://www.sigapp.org/sac/sac2020/

Accepted papers will be published in the ACM conference proceedings and will be included in the ACM digital library.

Important Dates:
Paper submission: September 29, 2019
Author notification: November 24, 2019
Camera-ready copies: December 9, 2019

Authors are invited to submit original work not previously published, nor currently submitted elsewhere. Authors submit full papers in pdf format using the link to the submission site at http://www.dedisys.org/sac20/. Authors are allowed up to 10 pages, but with more than 8 pages in the final camera ready, there will be a charge of 80USD per extra page.

Call details
============
While computing is provided by the cloud and services increasingly pervade our daily lives, dependability, adaptiveness and security become a cornerstone of the information society. Unfortunately, most innovative systems and applications (Internet of Things, Industrial IoT, Smart Environments, Mashups, NewSQL) suffer from a lack of dependability and security, which is fueled by global scale, mobility and heterogeneity, as well as the demand for resource awareness, green computing, and increasing cost pressure.

Among technical factors, software development methods, tools, and techniques contribute to dependability and security, as defects in software products and services may lead to failure and also provide typical access for malicious attacks. In addition, there is a wide variety of fault and intrusion tolerance techniques available, including persistence provided by databases, redundancy and replication, group communication, transaction monitors, reliable middleware, cloud infrastructures, light-weight virtualization (docker), fragmentation-redundancy-scattering, and trustworthy service-oriented and microservice architectures with explicit control of quality of service properties and monitoring of service level agreements.

Furthermore, adaptiveness is envisaged in order to react to observed, or act upon expected changes of the system itself, the context/environment (e.g., resource variability or failure/threat scenarios) or users' needs and expectations. Provided without explicit user intervention, this is also termed autonomous behavior or self-properties, and often involves monitoring, diagnosis (analysis, interpretation), and reconfiguration (repair). In particular, adaptation is also a means to achieve dependability and security in a computing infrastructure with dynamically varying structure and properties and can itself be provided as a service (Control-as-a-service).

Topics of interest
==================
* Dependable, Adaptive, and Secure Distributed Systems (DADS)
* Architectures, architectural styles, and middleware for DADS
* Protocols for DADS
* Modeling, design, and engineering of DADS
* Foundations and formal methods for DADS
* Applications of DADS
* Evaluations, testing, benchmarking, and case studies of DADS
* Holistic aspects of DADS

Track program co-chairs
=======================
Karl M. Goeschka, Vienna University of Technology (Austria)
(main contact: dads@dedisys.org)
Rui Oliveira, Universidade do Minho (Portugal)
Peter Pietzuch, Imperial College London (UK)
Giovanni Russello, University of Auckland (New Zealand)

Program committee
=================
Filipe Araujo, University of Coimbra (Portugal)
Claudio Agostino Ardagna, University of Milan (Italy)
Mikael Asplund , Linköping University (Sweden)
Jean Bacon, University of Cambridge (UK)
Alberto Bartoli, University of Trieste (Italy)
Sana Belguith, University of Salford (UK)
Alysson Bessani, Universidade de Lisboa (Portugal)
Stefan Beyer, Cryptonics Consulting (Spain)
Andrea Bondavalli, University of Florence (Italy)
Antonio Casimiro, Universidade de Lisboa (Portugal)
Paulo Coelho, Federal University of Uberlandia (Brazil)
Mauro Conti, Universita di Padova (Italy)
Gianpaolo Cugola, Politecnico di Milano (Italy)
Shujie Cui, Imperial College (New Zealand)
Rogerio De Lemos, University of Kent (UK)
Felicita Di Giandomenico, ISTI-CNR, Pisa (Italy)
Naranker Dulay, Imperial College London (UK)
David Eyers, University of Otago (New Zealand)
Nikolaos Georgantas, INRIA (France)
Vincenzo Gulisano, Chalmers University (Sweden)
Matti Hiltunen, AT&T Labs (USA)
Shanshan Jiang, SINTEF (Norway)
Nesrine Kaaniche, University of Sheffield (UK)
Ferhat Khendek, Concordia University (Canada)
Mikel Larrea, Euskal Herriko Unibersitatea (Spain)
Mark Little, JBoss (UK)
István Majzik, Budapest UTE (Hungary)
Odorico Mendizabal, Federal University of Santa Catarina (Brazil)
Matteo Migliavacca, University of Kent (UK)
Alberto Montresor, University of Trento (Italy)
Gero Mühl, University of Rostock (Germany)
Francesc Daniel Muñoz-Escoí, UP Valencia (Spain)
Marta Patiño-Martinez, UP Madrid (Spain)
Jose Pereira, Universidade do Minho (Portugal)
Barry Porter, Lancaster University (UK)
Luís Rodrigues, INESC-ID/IST (Portugal)
Luigi Romano, University of Naples (Italy)
Romain Rouvoy, INRIA (France)
Matthieu Roy, LAAS-CNRS, Toulouse (France)
Alirio Sá, Federal University of Bahia (Brazil)
Valerio Schiavoni, Université de Neuchâtel (Switzerland)
Elad Schiller, Chalmers University (Sweden)
Lionel Seinturier, University of Lille (France)
Marjan Sirjani, Reykjavik University (Iceland)
Stefan Tai, Information Systems Engineering, TU Berlin (Germany)
Elena Troubitsyna, Åbo Akademi University (Finland)
Eddy Truyen, Katholieke Universiteit Leuven (Belgium)
Sara Tucci Piergiovanni, CEA - LIST, Saclay (France)
Luis Veiga, Technical University of Lisbon (Portugal)
Ricardo Vilaça, Universidade do Minho (Portugal)
Roman Vitenberg, University of Oslo (Norway)
Nicola Zannone, Technical University of Eindhoven (Netherlands)

Related Resources

ACM DADS 2022   ACM Dependable, Adaptive, and Secure Distributed Systems
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
ACM BSCI 2022   The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing
SoCAV 2022   2022 International Symposium on Connected and Autonomous Vehicles (SoCAV 2022)
ASE 2022   37th IEEE/ACM International Conference on Automated Software Engineering
IJMNCT 2022   International Journal of Mobile Network Communications & Telematics
ESEC/FSE 2022   The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering
IEEE COINS 2022   BCIOT - Special Track on Blockchain and Internet of Things (IoT)