ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show HTML Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
Wed, 9 Nov 2011 09:47:08 +0900
text/plain; charset="iso-8859-1"
Stephan Sigg <[log in to unmask]>
text/plain (128 lines)


First Workshop on Resilient Cyber-physical SystemS (ReSyS)
- Social Infrastructures, ICT and Mobility -


in conjunction with
the 25th International Conference on 
Architecture of Computing Systems (ARCS)
in Munich, Germany, February 28th - March 2nd, 2012



Cyber-physical systems support domains of social infrastructures in monitoring 
and controlling their physical environment. Context data of a physical 
environment is being collected by sensors, digitally processed as well as 
stored, and as a result processes and flows of this physical environment are 
However, social infrastructures are threatened by crime, terrorism, and 
natural disasters.A lesson learned from latest dramatically unwanted 
interference - Great East Japan Earthquake and its consequences - is that 
Cyber-physical systems cannot be protected against failures. There is always 
the possibility of an unexpected interference that breaks the assumptions of 
current risk management guidelines and standards. 
Resilience aims at an equilibrium of a system in case of interferences. It is 
not only understood in terms of resistance against threats and attacks 
(prevent and protect) but also in terms of the ability to mitigate them 
(respond). The affected system should still deliver trusted services in an 
hostile environment. A resilient Cyber-physical system consists of numerous 
components, such as sensors, working with each other in a decentralised way 
such that when some components fail, the system as a whole dynamically uses 
equivalent ones and runs the expected service continuously while at the same 
time fulfilling security requirements at an acceptable degree. 


The workshop focuses on identifying open research questions and discussing 
mechanisms to establish this property. Additionally to accepted articles and 
their presentations, we plan to offer a combined demo, poster and video session 
to foster hands-on experience, discussion and collaboration among 
participants. Each full paper session focuses on papers with solid research 


The topics of the workshop are but not limited to

[Context-based Security Mechanisms]
- Context-based mobile wireless authentication
- Context-based device pairing
- Securing context-aware applications
- Sensor-, context-, and location-based authentication
- Spontaneous secure context-based device interactions
- Cyber-physical security

[Autonomic and Dependable Computing]
- Methods and Techniques for Self-Configuration, Self-Healing, Self-Protecting
- Distributed Systems and Agents
- Flexible and Secure Orchestration of ICT Services
- Trustworthy Organic Computing

[Privacy in Cyber-physical Systems]
- Establishing and managing trust in cyber physical systems
- Anonymous/pseudonymous context aware mobile computation
- Legal and social issues of security and privacy for mobile devices
- Perception of security and privacy in mobile computing

[Resilient Cryptography]
- Entropy of context based keys
- Fuzzy cryptography
- Security with noisy data

We are seeking unpublished and original submissions in PDF format. Submission 
should follow the ARCS workshop template and not exceed 6 pages.
The review process is double blind and authors are asked to remove any 
indication to their identity from their submission.  

Important dates

Paper submission deadline:              December 01, 2011
Notification of acceptance:             December 15, 2011
Final paper submission:                         January 03, 2012
Workshop:                                       February 28, 2012

Workshop chairs

Stephan Sigg, National Institute of Informatics, Japan
Sven Wohlgemuth, National Institute of Informatics, Japan

Program Committee

- Matthias Budde, KIT, Germany
- Alexander de Luca, Universität München, Germany
- Isao Echizen, National Institute of Informatics, Japan
- Yusheng Ji, National Institute of Informatics, Japan
- Thomas Koslowski, Albert-Ludwig University Freiburg, Germany
- Ulrike Lucke, University of Potsdam, Germany
- Sjouke Mauw, Universite du Luxemburg, Luxembourg
- Günter Müller, Albert-Ludwig University Freiburg, Germany
- Kazuhiro Minami, National Institute of Informatics, Japan
- Klaus Rechert, Albert-Ludwig University Freiburg, Germany
- Stefan Sackmann, Martin-Luther University Halle-Wittenberg, Germany
- Sebastian Schildt, TU Braunschweig, Germany
- Matthias Schunter, IBM Research Zürich, Switzerland 
- Noboru Sonehara, National Institute of Informatics, Japan
- Eran Toch, Tel Aviv University, Israel
- Jin Wook Byun, Pyecngtaek University, Korea
- Mi Zhang, University of Southern California, US
- Rui Zhou, University of Electronic Science and Technology, China

                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see