Submit a Paper

The First International Workshop on Dependability and Security in Complex and Critical Information Systems

DEPEND 2008

August 25-31, 2008 - Cap Esterel, France


Technical Co-Sponsors and Logistics Supporters

This workshop is part of SECURWARE 2008.

 

Publishing Information:

Publisher: IEEE Computer Society Press
Posted: IEEE Digital Library
Indexing process
 

Submit a Paper:

First, fill out the submission form with information about your paper. Please, fill it out only once for each paper, and do not resubmit it. Contact the address below if you run into any difficulties.

As the designated correspondence author, you will then receive a first e-mail message containing the paper ID. The information in the email will allow you to submit your paper.

If you have some problems send your paper via this e-mail (please report your paper ID in the text of your mail AND the name of the conference).

The conference staff will contact you only if the paper does not print properly or has other problems.

You can change information about your paper, submit brief corrections, view your reviews and create rebuttal, and even edit your personal information by following the link in the initial confirmation email.

Touristic Information:

Touristic information is available from the hosting conference, SECURWARE 2008.

Hotels and Travel:

Hotels and travel information is available from the hosting conference page, SECURWARE 2008.

Call for Papers:

Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airlines, road), Health and emergency response rely on networked communication and information systems (CISs).

DEPEND 2008 workshop will address new approaches dealing with today's limitations and covering different complementary topics on these areas.

Design, development, and validation of tools for incident detection and decision support became crucial for security and dependability in complex systems. It is challenging how these tools could span different time scales and provide solutions for survivability that range from immediate reaction to global and smooth reconfiguration through policy based management for an improved resilience. Enhancement of the self-healing properties of critical infrastructures by planning, designing and simulating of optimized architectures tested against several realistic scenarios is also aimed.

Improvement of the risk and crisis management in critical infrastructures is achieved by the design of new models, countermeasures, and incident management tools. These new models will help to mitigate the cascading and escalading effects induced by different kind of dependencies present in CISs. Development of decision support tools for critical infrastructures should be validated by scenarios based on different case studies.

We are looking for contributions on the actual trends in coping with these new challenges within the research community. We expect some lessons learnt and description of the results coming from different R&D projects (e.g., like ones in the EC 6th Framework Program), or any other worldwide initiatives. We hope we will be able to identify the gaps between the needs and today's available solutions along with new challenges and potential for future directions.

The workshop will provide a forum for detailed exchange of ideas, techniques, and experiences with the goal of understanding the academia and the industry trends related to the new challenges in dependability and security in critical and complex information systems. Researchers, designers and administrators, product and service developers, and other interested persons from academia, industry, and the government are welcome and encouraged to participate with unpublished contributions in areas including, but not limited to:

  • Building and preserving scalable, secure and resilient architectures
  • Dependability modelling and dynamic management policies
  • Verification and validation (including model checking) of dependable software architectures
  • Real time detection and recovery capabilities against intrusions, malfunctions and failures
  • Redundancy and reconfiguration architectures
  • Integrated response architectures
  • Planning of optimal configurations for anticipated operational modes
  • Modelling of networks and Information Systems
  • Simulation of modelled configurations
  • Fast reconfiguration with priority to critical services
  • Incident (including intrusion) detection and quick containment

INSTRUCTION FOR THE AUTHORS

The DEPEND 2008 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index the papers with major indexes.

Important deadlines:

Submission deadline April 5, 2008 April 15, 2008
Notification May 15, 2008 May 19, 2008
Registration and camera ready June 1, 2008 June 5, 2008

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via the an automated submission system.

Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page.

Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference’s CD collection, together with the regular papers. Please send your presentations to skarmeta@dif.um.es and andre.cotton@fr.thalesgroup.com.

Tutorials

Tutorials provide overviews of current high interest topics. Proposals can be for half or full day tutorials. Please send your proposals to petre@iaria.org.

Panel proposals:

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies.

For more information, send emails to skarmeta@dif.um.es and andre.cotton@fr.thalesgroup.com.

Committees:

DEPEND 2008 Technical Program Committee

Chairs:
Antonio F. Gómez Skarmeta, University of Murcia, Spain skarmeta@dif.um.es
André Cotton, Thales Communication, France andre.cotton@fr.thalesgroup.com

(to be completed)

+André Cotton, Thales Communication, France
+Wolfgang Fritsche, IABG, Germany
+Antonio F. Gómez Skarmeta, University of Murcia, Spain
+Antonio Lioy,  Politécnico di Torino, Italy
+Javier López, Univ Malaga, Spain
+Fabio Martinelli, CNR, Italy
+Syed Naqvi, CETIC, Belgium
+Aljosa Pasic, ATOS Origin, Spain
+Patrick Radja, Advanced Communication and Security Programs, EADS, Europe
+Michel Riguidel, Ecole Nationale Supérieure des Télécommunications, France
+Reijo Savola, VTT Technical Research Centre of Finland - Oulu, Finland
+Neeraj Suri, TU_Darmstadt, Germany
+Daniel Vladusic, Xlab, Slovenia
+Wojciech Zamojski, Wroclaw University of Technology, Poland

(to be completed)

Tutorials:

Tutorials are available from the hosting conference page, SECURWARE 2008.

Preliminary Program:

Preliminary program is available from the hosting conference page, SECURWARE 2008.

Manuscript Preparation:

Manuscript preparation is available from the hosting conference page, SECURWARE 2008.

Registration Form:

Registration form is available from the hosting conference page, SECURWARE 2008.

Statistics:

Statistics are available from the hosting conference page, SECURWARE 2008.

Photos:

Photos are available from the hosting conference page, SECURWARE 2008.

Awards:

Awards are available from the hosting conference page, SECURWARE 2008.

 
 

Copyright (c) 2006-2008, IARIA