posted by organizer: trouva || 2328 views || tracked by 5 users: [display]

SNS 2017 : Second IEEE International Workshop on Security in NFV-SDN

FacebookTwitterLinkedInGoogle

Link: http://sns2017.eu/
 
When Jul 3, 2017 - Jul 7, 2017
Where Bologna, Italy
Abstract Registration Due Mar 20, 2017
Submission Deadline Mar 27, 2017
Notification Due Apr 25, 2017
Final Version Due May 8, 2017
Categories    security   nfv   SDN   5G
 

Call For Papers

Second IEEE International Workshop on Security in NFV-SDN (SNS2017)
(website: http://sns2017.eu/)
in conjunction with the 3rd IEEE Conference on Network Softwarization (NetSoft 2017)
July 3-7, 2017 Bologna, Italy

Scope

Network Function Virtualization (NFV) and Software Defined Network (SDN) technologies are radically
changing telecommunication networks. NFV virtualizes network services to reduce the dependency on
underlying hardware which aids resource management, provides faster service enablement and lowers OPEX
and CAPEX. SDN separates the control functions from the underlying physical network by decoupling the
control and data planes thereby offering improved programmability, ease of deployment, management,
reduced costs, better scalability, availability, flexibility and fine-grain control of traffic. But how does this
widespread adoption of NVF-SDN impact on network security, especially with an increased attack surface
implied by virtualization? In this workshop, we invite high-quality submissions in the areas of NFV and SDN
security and related areas. Submitted papers should highlight methods and approaches that can be used to
analyse the security risks, requirements and techniques related to NFV and SDN and to provide methods and
approaches to assure security and mitigate threats in NFV and SDN.

Topics of interest

Topics of interest include but are not limited to the following areas:
* Security threats and vulnerabilities introduced by NFV and SDN technologies
* Management and orchestration of NFV and SDN elements for security
* Security, reliability and privacy through SDN and NFV in 5G networks
* Threat detection and mitigation through SDN and NFV
* Security policy specification and management in SDN and NFV systems
* Security related monitoring and analytics in SDN and NFV solutions
* 5G security architecture, trust and confidence
* Authentication, Authorization and Accounting in SDN
* Security of applying SDN to wireless and mobile network
* Security of applying NFV and SDN to IoT
* Security of applying NFV and SDN to cloud computing
* Risk and compliance issues in SDN
* Security architectures for SDN
* Security standards for SDN
* Security of SDN data plane
* Security of SDN control plane
* Security of SDN application plane
* Security of routing in SDN
* Security as a service for SDN

Important Dates

* Paper Submission: March 10, 2017
* Notification of Acceptance: April 18, 2017
* Camera Ready: May 3, 2017

Paper Submission Guideline

The manuscripts must be prepared in English, following IEEE two-column Manuscript Templates
(http://www.ieee.org/conferences_events/conferences/publishing/templates.html) for Conference
Proceedings with a maximum length of six (6) printed pages for full papers and up to four (4) pages for short
papers (work in progress), including figures. All papers need to be submitted in PDF format via JEMS at
https://submissoes.sbc.org.br/home.cgi?c=2763. All submitted papers will be peer-reviewed. To be
published in the Workshop Proceedings and to be eligible for publication in IEEE Xplore, at least one author of
an accepted paper is required to register and present the paper at the workshop. The IEEE reserves the right to
exclude a paper from distribution after the conference (including its removal from IEEE Explore) if the paper is
not presented at the conference. Papers are reviewed on the basis that they do not contain plagiarized
material and have not been submitted to any other conference at the same time (double submission). These
matters are taken very seriously and the IEEE Communications Society will take action against any author who
engages in either practice.

Workshop Co-Chairs

* Dr. Shao Ying Zhu, University of Derby, UK
* Linas Maknavicius, Nokia Bell Labs, France
* Eleni Trouva, NCSR Demokritos, Greece
* Dr. Colin Allison, University of St Andrews, UK
* Dr. George Gardikis, Space Hellas, Greece

Technical Program Committee

* Michail-Alexandros Kourtis - NCSR Demokritos, Greece
* Gergely Biczók - Budapest Univ. of Technology and Economics, Hungary
* Roberto Bifulco - NEC Labs Europe, Germany
* Carolina Canales - Ericsson, Spain
* Walter Cerroni, University of Bologna
* Augusto Ciuffoletti - University of Pisa, Italy
* Miguel Angel Garcia - Ericsson, Spain
* Ludovic Jacquin - Hewlett Packard Labs, UK
* Harilaos Koumaras - NCSR Demokritos, Greece
* Jianxin Li-Beihang University, China
* Antonios Litke - Infili Information Intelligence Ltd, Greece
* Diego Lopez, Telefonica, Spain
* Alan Miller - University of St Andrews, UK
* Nikolaos Papadakis - Infili Information Intelligence Ltd, Greece
* Yacine Rebahi, Fraunhofer Institute for Open Communication Systems FOKUS, Germany
* Sandra Scott-Hayward - Queen's University Belfast, UK
* Muhammad Shuaib Siddiqui - i2CAT, Spain
* George Xilouris - NCSR Demokritos, Greece
* Yacine Rebahi, Fraunhofer Institute for Open Communication Systems FOKUS, Germany

Contact

Shao Ying Zhu s.y.zhu@derby.ac.uk
Eleni Trouva trouva@iit.demokritos.gr


Related Resources

Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
COMNET SI SDN/NFV Security/Performance 2017   Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV
NOMS 2018   IEEE/IFIP Network Operations and Management Symposium
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
IJSC 2017   International Journal on Soft Computing
IEEE - ICISE - Ei 2018   2018 3rd International Conference on Information Systems Engineering (ICISE 2018)--IEEE Xplore, Ei Compendex
IJCCSA 2017   International Journal on Cloud Computing: Services and Architecture
IoT-CyberTrust 2018   IEEE Computer Special Issue on Cybertrust in the IoT Age
CODASPY 2018   Conference on Data and Application Security and Privacy
CyCon 2018   10th IEEE International Conference on Cyber Conflict (CyCon X)