posted by organizer: goeschka || 3067 views || tracked by 4 users: [display]

ACM SAC DADS 2020 : ACM Dependable, Adaptive, and Secure Distributed Systems

FacebookTwitterLinkedInGoogle

Link: http://www.dedisys.org/sac20/
 
When Mar 30, 2020 - Apr 3, 2020
Where Brno, Czech Republic
Submission Deadline Sep 29, 2019
Notification Due Nov 24, 2019
Final Version Due Oct 9, 2019
Categories    dependability   security   blockchain   DAPPS
 

Call For Papers

FINAL CALL FOR PAPERS
=====================

+----------------------------------------------------------------------------+
| 15th Track on Dependable, Adaptive, and Secure Distributed Systems (DADS) |
| of the 35th ACM Symposium on Applied Computing (SAC'20) |
+----------------------------------------------------------------------------+

March 30 - April 3, 2020
Brno, Czech Republic
http://www.dedisys.org/sac20/
https://www.sigapp.org/sac/sac2020/

Accepted papers will be published in the ACM conference proceedings and will be included in the ACM digital library.

Important Dates:
Paper submission: September 29, 2019
Author notification: November 24, 2019
Camera-ready copies: December 9, 2019

Authors are invited to submit original work not previously published, nor currently submitted elsewhere. Authors submit full papers in pdf format using the link to the submission site at http://www.dedisys.org/sac20/. Authors are allowed up to 10 pages, but with more than 8 pages in the final camera ready, there will be a charge of 80USD per extra page.

Call details
============
While computing is provided by the cloud and services increasingly pervade our daily lives, dependability, adaptiveness and security become a cornerstone of the information society. Unfortunately, most innovative systems and applications (Internet of Things, Industrial IoT, Smart Environments, Mashups, NewSQL) suffer from a lack of dependability and security, which is fueled by global scale, mobility and heterogeneity, as well as the demand for resource awareness, green computing, and increasing cost pressure.

Among technical factors, software development methods, tools, and techniques contribute to dependability and security, as defects in software products and services may lead to failure and also provide typical access for malicious attacks. In addition, there is a wide variety of fault and intrusion tolerance techniques available, including persistence provided by databases, redundancy and replication, group communication, transaction monitors, reliable middleware, cloud infrastructures, light-weight virtualization (docker), fragmentation-redundancy-scattering, and trustworthy service-oriented and microservice architectures with explicit control of quality of service properties and monitoring of service level agreements.

Furthermore, adaptiveness is envisaged in order to react to observed, or act upon expected changes of the system itself, the context/environment (e.g., resource variability or failure/threat scenarios) or users' needs and expectations. Provided without explicit user intervention, this is also termed autonomous behavior or self-properties, and often involves monitoring, diagnosis (analysis, interpretation), and reconfiguration (repair). In particular, adaptation is also a means to achieve dependability and security in a computing infrastructure with dynamically varying structure and properties and can itself be provided as a service (Control-as-a-service).

Topics of interest
==================
* Dependable, Adaptive, and Secure Distributed Systems (DADS)
* Architectures, architectural styles, and middleware for DADS
* Protocols for DADS
* Modeling, design, and engineering of DADS
* Foundations and formal methods for DADS
* Applications of DADS
* Evaluations, testing, benchmarking, and case studies of DADS
* Holistic aspects of DADS

Track program co-chairs
=======================
Karl M. Goeschka, Vienna University of Technology (Austria)
(main contact: dads@dedisys.org)
Rui Oliveira, Universidade do Minho (Portugal)
Peter Pietzuch, Imperial College London (UK)
Giovanni Russello, University of Auckland (New Zealand)

Program committee
=================
Filipe Araujo, University of Coimbra (Portugal)
Claudio Agostino Ardagna, University of Milan (Italy)
Mikael Asplund , Linköping University (Sweden)
Jean Bacon, University of Cambridge (UK)
Alberto Bartoli, University of Trieste (Italy)
Sana Belguith, University of Salford (UK)
Alysson Bessani, Universidade de Lisboa (Portugal)
Stefan Beyer, Cryptonics Consulting (Spain)
Andrea Bondavalli, University of Florence (Italy)
Antonio Casimiro, Universidade de Lisboa (Portugal)
Paulo Coelho, Federal University of Uberlandia (Brazil)
Mauro Conti, Universita di Padova (Italy)
Gianpaolo Cugola, Politecnico di Milano (Italy)
Shujie Cui, Imperial College (New Zealand)
Rogerio De Lemos, University of Kent (UK)
Felicita Di Giandomenico, ISTI-CNR, Pisa (Italy)
Naranker Dulay, Imperial College London (UK)
David Eyers, University of Otago (New Zealand)
Nikolaos Georgantas, INRIA (France)
Vincenzo Gulisano, Chalmers University (Sweden)
Matti Hiltunen, AT&T Labs (USA)
Shanshan Jiang, SINTEF (Norway)
Nesrine Kaaniche, University of Sheffield (UK)
Ferhat Khendek, Concordia University (Canada)
Mikel Larrea, Euskal Herriko Unibersitatea (Spain)
Mark Little, JBoss (UK)
István Majzik, Budapest UTE (Hungary)
Odorico Mendizabal, Federal University of Santa Catarina (Brazil)
Matteo Migliavacca, University of Kent (UK)
Alberto Montresor, University of Trento (Italy)
Gero Mühl, University of Rostock (Germany)
Francesc Daniel Muñoz-Escoí, UP Valencia (Spain)
Marta Patiño-Martinez, UP Madrid (Spain)
Jose Pereira, Universidade do Minho (Portugal)
Barry Porter, Lancaster University (UK)
Luís Rodrigues, INESC-ID/IST (Portugal)
Luigi Romano, University of Naples (Italy)
Romain Rouvoy, INRIA (France)
Matthieu Roy, LAAS-CNRS, Toulouse (France)
Alirio Sá, Federal University of Bahia (Brazil)
Valerio Schiavoni, Université de Neuchâtel (Switzerland)
Elad Schiller, Chalmers University (Sweden)
Lionel Seinturier, University of Lille (France)
Marjan Sirjani, Reykjavik University (Iceland)
Stefan Tai, Information Systems Engineering, TU Berlin (Germany)
Elena Troubitsyna, Åbo Akademi University (Finland)
Eddy Truyen, Katholieke Universiteit Leuven (Belgium)
Sara Tucci Piergiovanni, CEA - LIST, Saclay (France)
Luis Veiga, Technical University of Lisbon (Portugal)
Ricardo Vilaça, Universidade do Minho (Portugal)
Roman Vitenberg, University of Oslo (Norway)
Nicola Zannone, Technical University of Eindhoven (Netherlands)

Related Resources

SP 2020   IEEE Symposium on Security and Privacy
UMAP 2020   ACM International Conference on User Modeling, Adaptation and Personalization
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
ACM--ICISE--Ei Compendex & Scopus 2020   ACM--2020 the 5th International Conference on Information Systems Engineering (ICISE 2020)--Ei Compendex & Scopus
BSP-IoT 2020   Blockchain Security and Privacy for the Internet of Things
icist 2020   acm- 10th International Conference on Information Systems and Technologies
SIPRO 2020   6th International Conference on Signal and Image Processing
BIOTC--ACM, Ei and Scopus 2020   ACM--2020 2nd Blockchain and Internet of Things Conference (BIOTC 2020)--Ei Compendex, Scopus