[ecoop-info] Call for papers: Second International Workshop for Autonomic Cloud Cybersecurity (ACC2015)
Bordbar
b.bordbar at cs.bham.ac.uk
Sat May 9 14:15:18 CEST 2015
Apologies for receiving multiple copies.
*****************************************************************************************
Second International Workshop for Autonomic Cloud Cybersecurity (ACC2015)
in conjunction with
IEEE International Conference on Cloud and Autonomic Computing (ICCAC2015)
and
IEEE International Conference on Self-Adaptive and Self-Organizing
System (SASO 2015)
*****************************************************************************************
Website: www.cs.bham.ac.uk/~bxb/acc2015/
<http://www.cs.bham.ac.uk/%7Ebxb/acc2015/>
Important Dates
Papers Submission: 22 June 2015
Acceptance Notification: 20 July 2015
Camera Ready: 3 August 2015
Workshop: 21 September 2015
Scope
Benefits of the cloud have been widely publicised. Cloud computing
services offer cost effective, scalable, and reliable outsourced
platforms. To benefit from economies of scale, cloud architectures are
homogenized to use only a small variety of applications and operating
systems. As a result, because of the size of the Cloud, the implications
for discovery of vulnerabilities are high. Security is often cited as a
main challenges facing cloud computing. The focus of this workshop is to
offer a discussion forum about autonomous cybersecurity systems, which
offer viable and well-suited solutions for cloud threat prediction,
detection, mitigation, and prevention.
We are soliciting original and unpublished results of ongoing research
projects, emerging trends, uses cases, and implementation experiences in
autonomous cloud cybersecurity systems and solutions.
The topics covered include, but are not limited to:
* Self-protection techniques of computing systems, networks and
applications
* Performance evaluation and metrics of self-protection algorithms
* Metrics to characterize and quantify the cybersecurity algorithms
(confidentiality, integrity, and availability of autonomic systems)
* Anomaly behavior analysis and discovery of autonomic systems and
services
* Data mining, stochastic analysis and prediction of autonomic systems
and applications
* Datasets and benchmarks to compare and evaluate different
self-protection techniques
* Autonomic prediction of cyber crime
* Cloud cryptographic systems
* Autonomous cyber threat mitigation methods
* Cloud security protocols
* Automated cloud security analysis
* Cloud cybersecurity tools
Program Chairs
Behzad Bordbar, University of Birmingham, UK
Kangbin Yim, Soonchunhyang University, KR
Steering Committee
Bill Buchanan, Edinburgh Napier University, UK
Ernesto Damiani, Università degli Studi di Milano, IT
Anas Salah Eddin, Florida Polytechnic University, USA
Mohand-Said Hacid, Université Lyon 1, FR
Salim Hariri, University of Arizona, USA
John Howie, Cloud Security Alliance, USA
George Spanoudakis, City University London, UK
Page Limit and Formatting
The paper must be formatted in a two-column layout up to 8 pages, with
columns no more than 9.5 in. height and 3.5 in. width. The text must be
in Times font, 10-point or larger, with 11-point or larger line spacing.
Authors are encouraged to use the IEEE conference proceedings templates
(http://www.ieee.org/conferences_events/conferences/publishing/templates.html).
LaTeX submissions should use IEEEtran.cls version 1.8.
Submission
Submissions must be in Portable Document Format (.pdf), via Easy Chair
accessible through www.cs.bham.ac.uk/~bxb/acc2015/
<http://www.cs.bham.ac.uk/%7Ebxb/acc2015/>.
More information about the ecoop-info
mailing list