CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Proportional Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Sven Wohlgemuth <[log in to unmask]>
Reply To:
Sven Wohlgemuth <[log in to unmask]>
Date:
Sat, 31 Mar 2012 17:45:51 +0900
Content-Type:
text/plain
Parts/Attachments:
text/plain (116 lines)
[Apologies for cross postings. Please circulate to colleagues and prospective interested parties.]

2nd Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012)
============================================================================

Call for Papers

To be held in conjunction with the 7th International Conference on Availability, Reliability, and Security (ARES 2012 – <http://www.ares-conference.eu>).

August 20–24, 2012
University of Economics in Prague
Prague, Czech Republic

Accepted papers will be published in the ARES proceedings published by IEEE CPS. They will also be considered in conjunction with best papers of ARES 2012 for the selection to submit an extended version for further reviews in selected international journals.

Submission deadline: April 14, 2012.
The submission server is ready to welcome your submissions: <https://confdriver.ifs.tuwien.ac.at/ares2012>

Scope
=====
Information technology (IT) supports domains of social infrastructures in monitoring and controlling their physical environment. These embedded systems must inevitable deliver correct services for at least the critical functions according to the current situation. However, interferences due to crime, terrorism, and natural disasters threaten IT support and therewith safety. Affected systems should adapt to both the changed situation and the failure of services. Adaptive systems following the computing paradigm of Ubiquitous Computing promise to achieve liveness properties of data processing in any case of faults and changes. Hence, they are an option for improving cyber-physical systems in monitoring and controlling social infrastructures even in hostile environments. Although on demand orchestration of services creates adaptive systems of systems to implement the required functionality, these desired interdependencies bear vulnerabilities by, e.g., covert channels.

Whereas many security solutions are well studied for models and their implementation for separated security domains, this is not the case for adaptive systems. Firstly, adaptive systems change continuously their state. A model can only consider those states, which have already passed. Secondly, security domains overlap in adaptive systems, which demand a disclosure of private data to third parties resulting in data aggregation at services of different security domains. Thirdly, some processing purposes are not predictable at the time of data collection and service orchestration should not be excluded for new services. Enforcement of security in adaptive systems equals to enforcement of liveness and safety properties to achieve correct services by means of dependable and secure computing. The ability of a system to maintain an acceptable level of service in the face of any faults and challenges to normal operation is understood as resilience.

Since resilience research is still in its infancy, the main objective of this workshop is to identify research problems and to discuss future research initiatives regarding IT support for "Resilience in Social Infrastructures" as well as the necessity to take non-technical aspects into consideration. We encourage academic researchers and industry experts to present and discuss novel ideas and ongoing work. Contributions addressing promising approaches to provide and manage resilient infrastructures are invited as research in progress and best practices.

Topics
======
Autonomic and dependable computing
* Methods and techniques for self-configuration, self-healing, self-protecting, etc.
* Flexible and secure orchestration of IT services
* Trustworthy organic computing

Risk assessment and vulnerability analysis
* Economics of controls
* Risk assessment within adaptive systems
* Identification of vulnerabilities in Service-Oriented Computing

Policy management
* Policy languages for isolation in adaptive systems
* Matching of high-level policies with security-related execution traces
* Automatic identification of conflicts between policies
* Automatic resolution of policy conflicts
* Pattern-driven security engineering

Policy enforcement
* Recovery-Oriented Computing
* Enforcement of data removal
* Usage control mechanisms
* Observability of control and data flows
* Simulations of system behavior
* Conformance checking
* Data provenance
* Model checking for adaptive systems
* Digital forensics

Methods for resilience & best practices
* Privacy and security in participatory sensing 
* Business continuity plan and business continuity management
* Critical information infrastructure protection
* Human-centric resilience systems
* Measurements of resilience
* Resilience in cryptographic and communications protocols

Important Dates
===============
2012-04-14: Submission deadline
2012-05-01: Author notification
2012-05-18: Author registration
2012-06-01: Proceedings version
2012-08-20 - 2012-08-24: Conference/Workshop

Submission Guidelines
=====================
The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at: <http://www.ares-conference.eu/submission-guidelines>
Accepted papers will be published in the ARES proceedings published by IEEE CPS. They will also be considered in conjunction with best papers of ARES 2012 for the selection to submit an extended version for further reviews in selected international journals.

Workshop Co-Chairs
==================
Isao Echizen
National Institute of Informatics (NII), Japan
[log in to unmask]

Stefan Sackmann
Martin-Luther University Halle-Wittenberg, Germany
[log in to unmask]

Sven Wohlgemuth
National Institute of Informatics (NII), Japan
[log in to unmask]

Program Committee
=================
* Koichiro Hayashi, Institute of Information Security, Japan
* Bernd Heinrich, University ofInnsbruck, Austria
* Dennis Kundisch, University of Paderborn, Germany
* Javier Lopez, University of Malaga, Spain
* Hiroshi Maruyama, Institute of Statistical Mathematics, Japan
* Emanuela Merelli, University of Camerino, Italy
* Guenter Mueller, Albert Ludwig University Freiburg, Germany
* Eiji Okamoto, University of Tsukuba, Japan
* Alexander Pretschner, Karlsruhe Institute of Technology, Germany
* Ryoichi Sasaki, Tokyo Denki University, Japan
* Stephan Sigg, National Institute of Informatics, Japan
* Noboru Sonehara, National Institute of Informatics, Japan
* A Min Tjoa, Vienna University of Technology, Austria
* Edgar Weippl, Secure Business Austria, Austria
* Rigo Wenning, W3C/ERCIM, France
* Hiroshi Yoshiura, The University of Electro-Communications of Tokyo, Japan

    ---------------------------------------------------------------
                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2