|
Showing 1 - 2 of
2 matches in All Departments
ThisvolumecontainstheproceedingsofATC2009, the6thInternationalConf-
ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and
Organic Computing Systems into Reality. The conference was held in
Brisbane, A- tralia, during July 7-9, 2009. The conference was
technically co-sponsored by the IEEE and the IEEE Computer Society
Technical Committee on Scalable Computing. ATC 2009 was accompanied
by three workshops on a variety of research challenges within the
area of autonomic and trusted computing. ATC 2009 is a successor of
the First International Workshop on Trusted and Autonomic
Ubiquitous and Embedded Systems (TAUES 2005, Japan), the
International Workshop on Trusted and Autonomic Computing Systems
(TACS 2006, Austria), the Third International Conference on
Autonomic and Trusted Computing (ATC 2006, China), the 4th
International Conference on Autonomic and Trusted Computing (ATC
2007, Hong Kong), and the 5th International Conference on Autonomic
and Trusted Computing (ATC 2008, Norway) Computing systems
including hardware, software, communication and n-
worksaregrowingdramaticallyinbothscale andheterogeneity, becoming
overly complex. Such complexity is getting even more critical with
the ubiquitous permeation of embedded devices and other pervasive
systems. To cope with the growing and ubiquitous complexity,
autonomic computing focuses on se- manageable computing and
communication systems that exhibit self-awareness,
self-con?guration, self-optimization, self-healing, self-protection
and other self-x operationsto the maximumextent possible without
humaninterventionorgu- ance.
Organiccomputingadditionallyemphasizesnatural-analogueconceptslike
self-organization and controlled emergence. Any autonomic or
organic system must be trustworthy to avoid the risk of losing
control and to retain con?dence that the system will not fa
The 2009 Australasian Conference on Information Security and
Privacy was the 14th in an annual series that started in 1996. Over
the years ACISP has grown froma relativelysmall conferencewith a
largeproportionof paperscoming from Australia into a truly
international conference with an established reputation. ACISP 2009
was held at Queensland University of Technology in Brisbane, d- ing
July 1-3, 2009. This year there were 106 paper submissions and from
those 30 papers were accepted for presentation, but one was
subsequently withdrawn. Authors of - cepted papers came from 17
countries and 4 continents, illustrating the inter- tional ?avorof
ACISP. We would like to extend our sincere thanks to all authors
who submitted papers to ACISP 2009. The contributed papers were
supplemented by two invited talks from e- nent researchers in
information security. Basie von Solms (University of Joh- nesburg),
currently President of IFIP, raised the question of how well
dressed is the information security king. L. Jean Camp (Indiana
University) talked about how to harden the network from the friend
within. We are grateful to both of them for sharing their extensive
knowledge and setting challenging questions for the ACISP 2009
delegates. We were fortunate to have an energetic team of experts
who formed the Program Committee. Their names may be found
overleaf, and we thank them warmly for their considerable e?orts.
This team was helped by an even larger number of individuals who
reviewedpapers in their particularareasof expertise.
|
|