Registration Desk at DSN 2004 will be open on June 28 during the entire afternoon and the Welcome Reception. We strongly suggest that attendees register on June 28, and only latecomers use June 29 from 7.30 to 8.00.
Angelo Marino of EU will present during the Business Meeting the latest information on IST Programme and on the cooperation with NSF
Tutorial A "Creating Strategy and Tactics Cyberspace " and Tutorial C "Distributed Denial of Service Attacks Background, Diagnosis and Mitigation" have been cancelled all, other three Tutorials are confirmed
Dr. Leslie Lamport Keynote Speaker at DSN 2004
Preliminary information about DSN 2005
Workshop 1: Interdisciplinary approaches to achieving and analysing system dependability (IA)Submissions to: http://www.csr.city.ac.uk/dsnworkshop Extended deadline: March 15
Many current and expected problems in system dependability push the limits of practical techniques familiar to the DSN community. Organisations using computers involve a complex interaction of technical and human components set in the context of a physical environment. Unanticipated problems arise as emergent properties of the interplay between these different system components, and may defeat the efforts of the "traditional" DSN disciplines which focus on dependable hardware and software. The goal of this workshop is to bring together experts from different disciplines and application domains to exchange ideas, make concrete progress across disciplinary boundaries, and establish contacts and possible collaborations. The workshop will be of value to all DSN participants, providing a context that will challenge them to consider issues broader than their discipline. Contributions will be printed in the supplemental volume to the DSN proceedings, and the aim is that papers generated from this workshop will provide the basis for a special issue for an appropriate journal. Papers are requested of up to six pages in DSN format. The selected contributions will be grouped into sessions in which presentations will be followed by extended discussion periods. Sessions will be designed to achieve effective interchange of ideas among people from different backgrounds.
Workshop 2: Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS)Submissions to: http://www.iit.cnr.it/~diwans/DIWANS04.htm
Widespread proliferation of wireless RF technology has brought the possibility of infrastructureless networking to the forefront. Infrastructureless networks are often referred to as wireless ad hoc networks and they include sensor networks as an important subclass. Dependability issues such as security, reliability, availability, and quality of service are made more challenging by the wireless and infrastructureless environment. The goal of this workshop is to bring together researchers from the ad hoc networks, sensor networks, and dependable computing communities to focus exclusively on this important topic, to outline its specific and unique research challenges, and to identify some of the most promising candidate solution methods and techniques to address those challenges. The workshop is targeted at researchers and practitioners in the areas of ad hoc and sensor networks who are confronting dependability challenges, as well as those in the dependable computing community who are interested in wireless networks. The workshop will provide a stimulating and highly interactive forum for discussion of these challenges with an audience made up of individuals having diverse backgrounds and experiences in the relevant areas.
Co-Chairs: Saurabh Bagchi, Purdue University, USA (firstname.lastname@example.org) Doug Blough, Georgia Institute of Technology, USA (email@example.com) Paolo Santi, Istituto di Informatica e Telematica del CNR, Italy (firstname.lastname@example.org) Nitin Vaidya, University of Illinois at Urbana-Champaign, USA (email@example.com)
Workshop 3: Architecting Dependable Systems (ADS)Submissions to: http://www.cs.kent.ac.uk/wads
Architectural representations of systems have shown to be effective in assisting the understanding of broader system concerns by abstracting away from details of the system. The architectural level reasoning about dependability is only just emerging as an important theme in software development, considering the current complexity of emerging applications and the trend of building trustworthy systems from existing untrustworthy systems. This is a twin workshop to another being organised during ICSE 2004 (International Conference on Software Engineering) in 23-28 May 2004, Edinburgh, UK (http://conferences.iee.org/icse2004). The aim of this challenging initiative is to bring together researchers from both the software architectures and the dependability communities, and to have cross-fertilization from two different communities and to build strong collaboration possibilities among the participants. The post-proceedings of these two twin workshops will be published as a single LNCS volume by Springer-Verlag.
Co-Chairs: Rogerio de Lemos, University of Kent at Canterbury, UK (firstname.lastname@example.org), Cristina Gacek, University of Newcastle upon Tyne, UK (email@example.com), Alexander Romanovsky, University of Newcastle upon Tyne, UK (firstname.lastname@example.org)
Workshop 4: Fault Diagnosis and Tolerance in Cryptography (FDTC)Submissions to: http://www.elet.polimi.it/res/DSN04workshop
The workshop is intended to stimulate the development of methodologies and techniques for designing robust cryptographic systems and protecting them against both accidental faults and intentional intrusions and attacks, in particular those based on the malicious injection of faults into the device for the purpose of extracting the secret key. This relatively new research topic is of considerable interest to the international community of researchers in the fields of reliability and dependability on one hand, and cryptography on the other hand. It also has industrial relevance since it aims at facing an increasingly serious threat to several established and novel cryptosystems (e.g., smart-card and mobile terminals), that is, their vulnerability to malicious attacks.
Therefore, the proposed workshop aims at:
- Presenting the currently available preliminary results and challenges.
- Encouraging collaboration among the current researchers and possibly enlarging the community of researchers in this field.
- Advertising the research topic to both the cryptography and fault tolerance research communities, and stimulating the start of new research activities. Participation of European academic and industry researchers is expected, due to the large diffusion of smart-card and mobile systems research in Europe, besides participants from the U.S. and Far East countries.
Workshop 5: Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities (AC)Submissions to: http://www.aitcnet.org/AssuranceCases
An assurance case is a documented body of evidence that provides a compelling case that a system satisfies specified critical properties. We are holding a workshop to address assurance cases, drawing on a broad range of participants from security, safety, and other certification experiences. There is a wide range of participants who we believe can make substantial contributions to the workshop. These participants are in the safety, security, and certification communities (as researchers, practitioners, or certifiers). In addition, we intend to include speakers reflecting broader perspectives who can make a significant and perhaps novel contribution to the discussion. We hope that the workshop will start a process of continuing discussion across disciplines on the central challenges and opportunities for assurance cases, and initiate the development of a standard set of best practices and guidelines for developing and assessing assurance cases. we would like to make this the first in a series of annual workshops on assurance cases, and begin to form a cross-discipline community of interest.
Co-Chairs: Charles C. Howell, MITRE, USA (email@example.com) Shari Lawrence Pfleeger, RAND, USA (firstname.lastname@example.org) Victoria Stavridou-Coleman, SRI, USA (email@example.com) Sofia Guerra, Adelard, UK (firstname.lastname@example.org)