|
|||||||||||||||||||||||||||||
First, fill out the submission form with information about your paper. Please, fill it out only once for each paper, and do not resubmit it. Contact the address below if you run into any difficulties. As the designated correspondence author, you will then receive a first e-mail message containing the paper ID. The information in the email will allow you to submit your paper. If you have some problems send your paper via this e-mail (please report your paper ID in the text of your mail AND the name of the conference). The conference staff will contact you only if the paper does not print properly or has other problems. You can change information about your paper, submit brief corrections, view your reviews and create rebuttal, and even edit your personal information by following the link in the initial confirmation email.
Touristic information is available from the hosting conference, SECURWARE 2008.
Hotels and travel information is available from the hosting conference page, SECURWARE 2008.
Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airlines, road), Health and emergency response rely on networked communication and information systems (CISs). Design, development, and validation of tools for incident detection and decision support became crucial for security and dependability in complex systems. It is challenging how these tools could span different time scales and provide solutions for survivability that range from immediate reaction to global and smooth reconfiguration through policy based management for an improved resilience. Enhancement of the self-healing properties of critical infrastructures by planning, designing and simulating of optimized architectures tested against several realistic scenarios is also aimed. Improvement of the risk and crisis management in critical infrastructures is achieved by the design of new models, countermeasures, and incident management tools. These new models will help to mitigate the cascading and escalading effects induced by different kind of dependencies present in CISs. Development of decision support tools for critical infrastructures should be validated by scenarios based on different case studies. We are looking for contributions on the actual trends in coping with these new challenges within the research community. We expect some lessons learnt and description of the results coming from different R&D projects (e.g., like ones in the EC 6th Framework Program), or any other worldwide initiatives. We hope we will be able to identify the gaps between the needs and today's available solutions along with new challenges and potential for future directions. The workshop will provide a forum for detailed exchange of ideas, techniques, and experiences with the goal of understanding the academia and the industry trends related to the new challenges in dependability and security in critical and complex information systems. Researchers, designers and administrators, product and service developers, and other interested persons from academia, industry, and the government are welcome and encouraged to participate with unpublished contributions in areas including, but not limited to:
INSTRUCTION FOR THE AUTHORS The DEPEND 2008 Proceedings will be published by IEEE Computer Society Conference Publishing Services and on-line via IEEE XPlore Digital Library. IEEE will index the papers with major indexes. Important deadlines:
Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via the an automated submission system. Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Technical marketing/business/positioning presentations The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference’s CD collection, together with the regular papers. Please send your presentations to [email protected] and [email protected]. Tutorials Tutorials provide overviews of current high interest topics. Proposals can be for half or full day tutorials. Please send your proposals to [email protected]. Panel proposals: The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. For more information, send emails to [email protected] and [email protected].
DEPEND 2008 Technical Program Committee Chairs: (to be completed) +André Cotton, Thales Communication, France (to be completed)
Tutorials are available from the hosting conference page, SECURWARE 2008.
Preliminary program is available from the hosting conference page, SECURWARE 2008.
Manuscript preparation is available from the hosting conference page, SECURWARE 2008.
Registration form is available from the hosting conference page, SECURWARE 2008.
Statistics are available from the hosting conference page, SECURWARE 2008.
Photos are available from the hosting conference page, SECURWARE 2008.
Awards are available from the hosting conference page, SECURWARE 2008. |
|||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA