征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The workshop aims to bring the research community together in exploring the use of autonomic computing techniques to address cloud security, as well as techniques and approaches for securing cloud-based autonomic systems

组委会

General Chair

  • Mamadou H. Diallo

    SPAWAR Systems Center Pacific, U.S. Department of Defense, USA

Program Co-Chairs

  • Michael August

    SPAWAR Systems Center Pacific, U.S. Department of Defense, USA

  • Sherif Abdelwahed

    Mississippi State University, USA

  • Youssif Al-Nashif

    Florida Polytechnic University, USA

Technical Program Commmittee

  • Kim-Kwang Raymond Choo

    The University of Texas at San Antonio, USA

  • Tiago Cruz

    University of Coimbra, Portugal

  • Song Fu

    University of North Texas, USA

  • Roger Hallman

    SPAWAR Systems Center Pacific, U.S. Department of Defense, USA

  • Sokratis K. Katsikas

    Norwegian University of Science & Technology, Norway

  • Ryan Ko

    University of Waikato, New Zealand

  • Thomas Moyer

    MIT Lincoln Laboratory, USA

  • Nuno Neves

    Universidade de Lisboa, Portugal

  • Jason Nurse

    Department of Computer Science, University of Oxford, UK

  • Stacy Prowell

    Oak Ridge National Laboratory, USA

  • Muthu Ramachandran

    Leeds Beckett University, UK

  • Khaled Salah

    Khalifa University of Science, Technology & Research, UAE

  • Sachin Shetty

    Old Dominion University, USA

  • Vijay Varadharajan

    University of Newcastle, Australia

  • Verinder Rana

    SPAWAR Systems Center Pacific, U.S. Department of Defense, USA

Publicity and Web Chair

  • Christopher Graves

    SPAWAR Systems Center Pacific, U.S. Department of Defense, USA

征稿信息

重要日期

2018-06-06
摘要截稿日期
2018-06-12
初稿截稿日期
2018-07-08
初稿录用日期

The use of autonomic computing techniques to address cloud security

  • Challenges in autonomics and cloud security and privacy
  • Emerging issues in autonomic cloud security
  • Autonomic identity and access management in cloud computing
  • Autonomic cybersecurity monitoring and incident response in cloud computing
  • Autonomic auditing and accountability in cloud computing
  • Autonomic approaches to usable security in cloud computing
  • Autonomic security protocols in cloud computing
  • Autonomic approaches to privacy in the cloud
  • Autonomic approaches for securing data and communication in the cloud
  • Secure autonomics-based cloud federation
  • Self-adaptive security policies
  • Self-configuration of cloud systems
  • Scalable cybersecurity in the cloud
  • Autonomic event recovery in the cloud
  • Autonomic approaches to moving target defense in the cloud
  • Autonomic approaches to cyber defense in the cloud
  • Autonomic approaches to intrusion detection and prevention systems in the cloud
  • Techniques and approaches for building resilient cloud systems
  • Cybersecurity in fog and edge computing
  • Application of big data analytics to securing the cloud
  • Autonomic approaches to trusted computing

 

Techniques and approaches for securing cloud-based autonomic systems

  • Cybersecurity in the cloud for supporting IoT applications
  • Security protocols in cloud-based autonomic systems
  • Techniques and approaches for privacy preservation in cloud-based autonomic systems
  • Event detection and forensics in cloud-based autonomic systems
  • Techniques and approaches for cloud-based autonomic systems resiliency
  • Secure computing techniques for the cloud (securing data-in-processing via Homomorphic Encryption, Secure Multi-Party Computation, and other secure computing techniques).
  • Techniques and approaches for anomaly detection in cloud-based autonomic systems
  • Scalable cybersecurity in cloud-based autonomic systems
  • Ethical hacking and penetration testing in cloud-based autonomic systems
  • Case studies in securing cloud-based systems

作者指南

The papers must be formatted in a two-column layout up to 6 pages and must follow the IEEE proceedings format. All manuscripts will be reviewed and judged on merits including originality, significance, interest, correctness, clarity, and relevance to the broader community. Submitted papers must include original work and may not be under consideration for another workshop, conference or journal during the Autonomics and Cloud Security (ACS) workshop review process. Authors should submit their papers electronically following the instructions from the ICAC 2018 conference website (ICAC 2018). At least one author of the accepted paper is expected to register and present their work during the workshop for publication in IEEEXplore.

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    09月03日

    2018

    09月07日

    2018

  • 06月06日 2018

    摘要截稿日期

  • 06月12日 2018

    初稿截稿日期

  • 07月08日 2018

    初稿录用通知日期

  • 09月07日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询