[ecoop-info] Call for papers: Second International Workshop for Autonomic Cloud Cybersecurity (ACC2015)

Bordbar b.bordbar at cs.bham.ac.uk
Sat May 9 14:15:18 CEST 2015

Apologies for receiving multiple copies.

Second International Workshop for Autonomic Cloud Cybersecurity (ACC2015)
in conjunction with
IEEE International Conference on Cloud and Autonomic Computing (ICCAC2015)
IEEE International Conference on Self-Adaptive and Self-Organizing 
System (SASO 2015)

Website: www.cs.bham.ac.uk/~bxb/acc2015/ 

      Important Dates

     Papers Submission:  22 June 2015
     Acceptance Notification:   20 July 2015
     Camera Ready:    3 August 2015
     Workshop:   21 September 2015


Benefits of the cloud have been widely publicised. Cloud computing 
services offer cost effective, scalable, and reliable outsourced 
platforms. To benefit from economies of scale, cloud architectures are 
homogenized to use only a small variety of applications and operating 
systems. As a result, because of the size of the Cloud, the implications 
for discovery of vulnerabilities are high. Security is often cited as a 
main challenges facing cloud computing. The focus of this workshop is to 
offer a discussion forum about autonomous cybersecurity systems, which 
offer viable and well-suited solutions for cloud threat prediction, 
detection, mitigation, and prevention.

We are soliciting original and unpublished results of ongoing research 
projects, emerging trends, uses cases, and implementation experiences in 
autonomous cloud cybersecurity systems and solutions.

The topics covered include, but are not limited to:

  * Self-protection techniques of computing systems, networks and
  * Performance evaluation and metrics of self-protection algorithms
  * Metrics to characterize and quantify the cybersecurity algorithms
    (confidentiality, integrity, and availability of autonomic systems)
  * Anomaly behavior analysis and discovery of autonomic systems and
  * Data mining, stochastic analysis and prediction of autonomic systems
    and applications
  * Datasets and benchmarks to compare and evaluate different
    self-protection techniques
  * Autonomic prediction of cyber crime
  * Cloud cryptographic systems
  * Autonomous cyber threat mitigation methods
  * Cloud security protocols
  * Automated cloud security analysis
  * Cloud cybersecurity tools

      Program Chairs

     Behzad Bordbar,  University of Birmingham, UK
     Kangbin Yim, Soonchunhyang University, KR

      Steering Committee

     Bill Buchanan, Edinburgh Napier University, UK
     Ernesto Damiani,  Università degli Studi di Milano, IT
     Anas Salah Eddin, Florida Polytechnic University, USA
     Mohand-Said Hacid, Université Lyon 1, FR
     Salim Hariri,  University of Arizona, USA
     John Howie,  Cloud Security Alliance, USA
     George Spanoudakis,  City University London, UK

        Page Limit and Formatting

The paper must be formatted in a two-column layout up to 8 pages, with 
columns no more than 9.5 in. height and 3.5 in. width. The text must be 
in Times font, 10-point or larger, with 11-point or larger line spacing. 
Authors are encouraged to use the IEEE conference proceedings templates 
LaTeX submissions should use IEEEtran.cls version 1.8.


Submissions must be in Portable Document Format (.pdf), via Easy Chair 
accessible through www.cs.bham.ac.uk/~bxb/acc2015/ 

More information about the ecoop-info mailing list