While computing is provided by the cloud and services increasingly pervade our daily lives, dependability and security are no longer restricted to mission or safety critical applications, but rather become a cornerstone of the information society. Unfortunately, the most innovative systems and applications (Internet of Things, Smart Environments, Mashups, NewSQL) are the ones that also suffer most from a significant decrease in dependability and security when compared to traditional critical systems. In accordance with Laprie we call this effect the dependability gap, which is widened in front of us between demand and supply of dependability, and we can see this trend further fueled by volume, velocity and variety, as well as the demand for resource awareness, green computing, and increasing cost pressure.
Among technical factors, software development methods, tools, and techniques contribute to dependability and security, as defects in software products and services may lead to failure and also provide typical access for malicious attacks. In addition, there is a wide variety of fault and intrusion tolerance techniques available, including persistence provided by databases, redundancy and replication, group communication, transaction monitors, reliable middleware, cloud infrastructures, fragmentation-redundancy-scattering, and trustworthy service-oriented architectures with explicit control of quality of service properties and service level agreements. Furthermore, adaptiveness is envisaged in order to react to observed, or act upon expected changes of the system itself, the context/environment (e.g., resource variability or failure/threat scenarios) or users' needs and expectations. Provided without explicit user intervention, this is also termed autonomous behavior or self-properties, and often involves monitoring, diagnosis (analysis, interpretation), and reconfiguration (repair). In particular, adaptation is also a means to achieve dependability and security in a computing infrastructure with dynamically varying structure and properties.
The track provides a forum for scientists and engineers in academia and industry to present and discuss their latest research findings on selected topics in dependable, adaptive and trustworthy distributed systems and services. The topics of particular interest include, but are not limited to:
Authors submit full papers in PDF format using the submission link on the SAC web page. Authors are invited to submit original work not previously published, nor currently submitted elsewhere. Papers are welcome in all areas of Dependable and Adaptive Distributed Systems. Submission of the same paper to multiple tracks is prohibited. Submissions fall into the following categories, and different length requirements apply:
Student research abstracts (limited to 2 pages in camera-ready format, included in the registration fee. No extra pages allowed) are submitted in PDF format using the separate SRC submission link - for details please refer to the Student Research Competition (SRC) Program on the SAC web page.
The required format for the submission is the ACM SIG Proceedings Alternate Style. Please apply the ACM Computing Classification categories and terms. The template below provides space for this indexing. The ACM Computing Classification scheme can be found at http://www.acm.org/about/class/1998/.
Papers undergo a double-blind review. The author(s) name(s) and address(es) must NOT appear in the paper, and self-reference should be in the third person. This is to facilitate blind review. Only the title should be shown at the first page without the author's information. For your convenience, we have defined a \selfcite{myref} Latex command for self-references. Papers should describe original research (not submitted or published elsewhere). The author kit containing the Latex templates for the required style can be found here: dads18_author_kit.zip.
Accepted papers will be published in the annual conference proceedings and will be included in the ACM digital library. Paper registration is required, allowing the inclusion of the paper, poster, or SRC abstract in the conference proceedings. An author or a proxy attending SAC MUST present the paper. This is a requirement for including the work in the ACM/IEEE digital library. No-show of registered papers, posters, and SRC abstracts will result in excluding them from the ACM/IEEE digital library.
If you have further questions, please do not hesitate to contact us: dads@dedisys.org
User Name : srav
Posted 14-09-2017 on 11:06:51 AEDT