HICSS-39 Icon
Security and Survivability in
Unbounded Networked Systems

Part of the Software Technology Track

HICSS-39

January 4-7 2006
Hyatt Regency

Kauai

 

 


 
 
Call For Papers

The physical and logical boundaries of networked computing systems are becoming increasingly difficult to specify.  Many applications, ranging from simple distributed databases to grid-based medical image manipulations, are utilizing resources of unbounded environments.  For other applications, like the control of critical infrastructures, the bounds of the traditional control infrastructure are fading due to a general desire to have ease of access over the Internet.  However, this increases the chances of the applications to be affected by malicious act, e.g. hacking, virus or Trojans.  It is thus more important than ever to design mechanisms into the infrastructure and the applications that ensure survivability of critical or essential functionalities.

This minitrack addresses issues of security and survivability in large, non-trivial, unbounded networked computer systems, with an emphasis on recovery and adaptation. It considers systems and networks, including dynamic paradigms based on migratory agents, ad-hoc networks or grid computing. Papers on resistance and recognition that address the need or capability for safety critical software systems to “fail-safe” and “fail-secure” are also desired.  Submissions will be sought from researchers in the area of system survivability, software dependability, computer and network security, fault-tolerance and intrusion tolerance, and economic or statistical modeling of secure/survivable systems.  Topics include, but are not limited to:

      • Survivability in unbounded systems
      • Software survivability and its measurement
      • Safety critical failure modes
      • Network or system intrusion tolerance
      • Tolerating attacks in grid computing
      • Modeling malicious behavior or attacks
      • Survivability and security issues of mobile agent based systems
      • Survivability and security issues of ad-hoc networks
      • Mathematical models for verification of vulnerability to malicious acts
      • Models for measurement, evaluation, or validation of survivability
      • Software and hardware fault-tolerance
      • Design for dependability and/or survivability
      • PRA and hybrid fault models accounting for malicious acts and events

Minitrack Chairs

 

Axel Krings                                      krings@cs.uidaho.edu

IMAG                                               phone: +33 (0)4 76 61 20 73

Labo. Informatique et Distribution   fax: +33 (0)4 76 61 20 99
38330 Montbonnot Saint-Martin (France)

 

Paul Oman                                      oman@cs.uidaho.edu

Computer Science Department      phone: 208 885-6899

University of Idaho                           fax: 208 885-9052

Moscow, ID 83844-1010 (USA)


Azad Azadmanesh                          azad@unomaha.edu

Computer Science Department      phone: 402 554-3976

University of Nebraska at Omaha   fax: 402 554-3400
Omaha, NE 68182-0500 (USA)


Important Deadlines
May 31, 2005               (Optional) Abstracts submitted for guidance.
June 15, 2005             Full papers submitted as indicated below.
August 15, 2005         Notice of acceptance or rejection.
September 15, 2005   Camera-ready copies of accepted manuscripts due.
                                        At least one author must be registered for the conference by this date.

October 2, 2005          General registration free $575 applies until Dec. 10.

December 1, 2004      Deadline to guarantee hotel room reservation at conference rate.
                                        Deadline to receive conference registration refund.
                                        Late registration fee $675 applies.

Instructions for Authors

Authors submit full papers to the Peer Review System, following Author Instructions found on the HICSS we site (www.hicss.hawaii.edu).  All papers will be submitted in double column publication format and are limited to 10 pages including diagrams and references. Papers undergo a double-blind review.

INSTRUCTIONS FOR PAPER SUBMISSION
• HICSS papers must contain original material not previously published, nor currently submitted elsewhere.

• Consult the conference website (www.hicss.hawaii.edu) for the listing and description of Minitracks for HICSS-39.

• (optional)  Contact the Minitrack Chair(s) by email for guidance and verification of appropriate content.

• Do not submit the manuscript to more than one Minitrack Chair.   If unsure of which Minitrack is   appropriate, submit abstract to the Track Chair for guidance. 

• HICSS will conduct double-blind reviews of each submitted paper.

• Submit full paper according to detailed instructions found on the Peer Review System website. 



HICSS-39 Conference Tracks  

Collaboration Systems and Technology
Co-chair: Robert O. Briggs   bbriggs@GroupSystems;
Co-chair: Jay Nunamaker     jnunamaker@cmi.arizona.edu

Decision Technologies for Management
Chair: Dan Dolk   drdolk@nps.edu

Digital Media: Content and Communication
Chair: Michael Shepherd   shepherd@cs.cal.ca                        

E-Government
Chair: H. Jochen Scholl   jscholl@u.washington.edu 
   
Information Technology in Health Care
Chair: William Chismar  chismar@hawaii.edu

Internet & the Digital Economy
Co-chair: David King    david.king@jda.com; Co-chair: Alan Dennis  ardennis@indiana.edu

Knowledge Management Systems
Co-chair: Murray Jennex   murphjen@aol.com; Dave Croasdell    davec@unr.edu

Organizational Systems & Technology
Chair: Hugh Watson   hwatson@terry.uga.edu

Software Technology
Chair: Gul Agha   agha@cs.uiuc.edu

HICSS conferences are devoted to advances in the information, computer, and system sciences, and encompass developments in both theory and practice.   Papers may be theoretical, conceptual, tutorial or descriptive in nature.  Submissions undergo a double-blind peer referee process and those selected for presentation will be published in the Conference Proceedings.  Submissions must not have been previously published.

Conference Administration  
Ralph Sprague, Conference Chair                           
Email:  sprague@hawaii.edu

Sandra Laney, Conference Administrator
Email:  hicss@hawaii.edu

Eileen Robichaud Dennis, Track Administrator
Email: eidennis@indiana.edu

2006 Conference Venue  
Hyatt Regency Kauai
1571 Poipu Road
Koloa, Kauai HI 96756
1-808-742-1234
http://Kauai.hyatt.com