- From: Fulvio Frati <fulvio.frati@unimi.it>
- Date: Tue, 04 Mar 2014 14:24:16 +0100
- To: semantic-web@w3.org
- Message-id: <00a601cf37ad$0af5bb20$20e13160$@unimi.it>
[Apologies if you receive multiple copies of this message] ============================================================================ ===== The 2014 IEEE International Workshop on Autonomic Cloud Cybersecurity (ACC 2014) http://sesar.dti.unimi.it/ACC2014 Part of the IEEE International Conference on Cloud and Autonomic Computing (CAC 2014) http://www.autonomic-conference.org ============================================================================ ===== =========== Description =========== Cloud computing services offer cost effective, scalable, and reliable outsourced platforms. Cloud adoption is becoming rapidly ubiquitous; therefore, private and sensitive data is being moved into the cloud. This move is introducing new security and privacy challenges, which should be diligently addressed in order to avoid severe security repercussions. The focus of this workshop is to offer a discussion forum about autonomous cybersecurity systems, which offer viable and well-suited solutions for cloud threat prediction, detection, mitigation, and prevention. The workshop is part of the IEEE International Conference on Cloud and Autonomic Computing (CAC 2014), and is collocated with The 8th IEEE Self-Adaptive and Self-Organizing System Conference and The 14th IEEE Peer-to-Peer Computing Conference. We are soliciting original and unpublished results of ongoing research projects, emerging trends, uses cases, and implementation experiences in autonomous cloud cybersecurity systems and solutions. ================ Topics ================ The topics covered include, but are not limited to: - Self-protection techniques of computing systems, networks and applications. - Performance evaluation and metrics of self-protection algorithms. - Metrics to characterize and quantify the cybersecurity algorithms (confidentiality, integrity, and availability of autonomic systems) - Anomaly behavior analysis and discovery of autonomic systems and services. - Data mining, stochastic analysis and prediction of autonomic systems and applications. - Datasets and benchmarks to compare and evaluate different self-protection techniques. - Autonomic prediction of cyber crime. - Cloud cryptographic systems. - Autonomous cyber threat mitigation methods. - Cloud security protocols. - Automated cloud security analysis. - Cloud cybersecurity tools. ================== Paper Submission ================== Paper submission Papers submitted should be in the form of a two-page extended abstract. Manuscript preparation and style should follow the official IEEE proceedings format instructions. Papers should be submitted using the workshop submission page (https://www.easychair.org/conferences/?conf=acc2014). ================== Deadlines ================== - Paper submission: May 7, 2014 - Author notification: June 12, 2014 - Camera-ready paper: July 3, 2014 - Workshop: September 8, 2014 ===================== Organizing Committee ===================== General Chair: - Ernesto Damiani, Universita' degli Studi di Milano, Italy Co-Chairs: - Anas Salah Eddin, Florida Polytechnic University, USA - George Spanoudakis, City University London, UK Steering Committee: - John Howie (Chair), Cloud Security Alliance, USA - Salim Hariri, University of Arizona, USA - Bill Buchanan, Edinburgh Napier University, UK - Mohand-Said Hacid, Université Lyon 1, France
Received on Tuesday, 4 March 2014 13:24:36 UTC