|
|||
Call for Papers As computer systems become increasingly
large and complex, their Dependability, Security and Autonomy play critical
role at supporting next-generation science, engineering, and commercial applications.
These systems consist of heterogeneous software/hardware/network components
of changing capacities, availability, and in varied contexts. They provide
computing services to large pools of users and applications, and thus are
exposed to a number of dangers such as accidental/deliberate faults, virus
infections, malicious attacks, illegal intrusions, and natural disasters etc.
As a result, too often computer systems fail, become compromised, or perform
poorly and therefore untrustworthy. Thus, it remains a challenge to design,
analyze, evaluate, and improve the dependability and security for a trusted
computing environment. Trusted computing targets computing and communication
systems as well as services that are autonomous, dependable, secure, privacy
protect-able, predictable, traceable, controllable, assessable and
sustainable. The scale and complexity of information
systems evolve towards overwhelming the capability of system administrators,
programmers, and designers. This calls for the autonomic computing paradigm,
which meets the requirement of self-management by providing
self-optimization, self-healing, self-configuration, and self-protection. As
a promising means to implement dependable and secure systems in a
self-managing manner, autonomic computing technology needs to be further
explored. On the other hand, any autonomic system must be trustworthy to
avoid the risk of losing control and retain confidence that the system will
not fail. Trusted and autonomic computing and communications need synergistic
research efforts covering many disciplines, ranging from computer science and
engineering, to the natural sciences to the social sciences. It requires
scientific and technological advances in a wide variety of fields, as well as
new software, system architectures, and communication systems that support
the effective and coherent integration of the constituent technologies. Topics DASC2011
is the second conference event following DASC2009 (December 2009, Chengdu,
China) after the merger of the successful DASC symposium series previously
held as RAMPDS-05 (July 2005, Fukuoka, Japan), DASC-06
(September 2006, Indianapolis, USA), DASC-07 (September,
2007, Columbia, MD, USA), and the successful SecUbiq symposium series,
previously held as SecUbiq-05 (December 2005,
Nagasaki, Japan), SecUbiq-06 (August 2006,
Seoul, Korea), SecUbiq-07 (December 2007, Taipei, Taiwan) and
SecUbiq-08 (December 2008, Shanghai, Shanghai). DASC2011
is to bring together computer scientists, industrial engineers, and researchers
to discuss and exchange experimental and theoretical results, novel designs,
work-in-progress, experience, case studies, and trend-setting ideas in the
areas of dependability, security, trust and/or
autonomic computing systems. Topics of interest
include, but are not limited to:
Submission Guidelines Submissions
must include an abstract, keywords, the e-mail address of the corresponding
author and should not exceed 8 pages for main conference, including tables
and figures in IEEE CS format. The template files for LATEX or WORD can be
downloaded here. All paper
submissions must represent original and unpublished work. Submission of a
paper should be regarded as an undertaking that, should the paper be
accepted, at least one of the authors will register for the conference and
present the work. Submit your paper(s) in PDF file at the DASC2011 submission
site: http://cse.stfx.ca/~DASC2011/sub/. Publications Accepted
and presented papers will be included into the IEEE Conference Proceedings
published by IEEE CS Press. Authors of accepted papers, or at least one of
them, are requested to register and present their work at the conference,
otherwise their papers will be removed from the digital libraries of IEEE CS
and EI after the conference. Distinguished
papers presented at the conference, after further revision, will be published
in special issues of Journal of Computer and System Sciences, and Concurrency
and Computation: Practice and Experience. |
|||