30 March 2012

Call for Papers: Meta-Heuristics for Security, Reliability and Trust

A special issue of International Journal of Metaheuristics

The increasing complexity of recent systems and networks has raised new concerns in terms of security, reliability and trust. Indeed, the past few years have seen a significant increase in cyber attacks on the Internet, resulting in degraded confidence and trust in the use of Internet and computer systems.

In light of this, there is an increasing demand for measures to guarantee the privacy, integrity, and availability of resources in distributed systems such as grid and P2P systems. Furthermore, as heterogeneous computing systems such as grid and cloud systems become larger and larger, reliability issues of such systems need to be addressed. For the execution of applications in these systems, it is becoming increasingly important to provide reliable scheduling by evaluating the reliability of resources.

These new problems require dependable systems and networks which can intelligently react to abnormal situations and ensure the security, reliability, quality and trustworthiness of information. In the case of reliable scheduling, two important issues need to be considered: how to evaluate the reliability of a resource, and how to perform reliable scheduling based on the reliability information of a resource. Meta-heuristics provide a way to develop such techniques, algorithms, protocols and tools in different aspects such as authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems.

This special issue convenes research in the areas of security, reliability, trust and meta-heuristics. We seek to collect the most recent advances in meta-heuristics (genetic algorithms, ant colony algorithms, particle swarm optimisation, etc.) which are applied to security, reliability and trust.

Both theoretical papers and papers describing practical experiences are welcome.

Suitable topics include but are not limited to:
  •  Security, reliability and trust:
  •  Intrusion detection
  •  Cryptography, cryptanalysis
  •  Security protocols
  •  Quality of services
  •  Trust management
  •  Software validation and verification
  •  Certification of results
  •  Reliable scheduling
  •  Meta-heuristics:
  •  Genetic algorithms
  •  Genetic programming
  •  Evolution strategies
  •  Evolutionary programming
  •  Simulated annealing
  •  Tabu search
  •  Ant colony optimisation
  •  Particle swarm optimisation
Important Dates
Submission deadline:  20 February, 2013 (extended)
First notification:  15 March, 2013
Notification of acceptance:  15 June, 2013
Final version:  15 July, 2013

No comments: