posted by organizer: mhdiallo || 1727 views || tracked by 3 users: [display]

ACS 2018 : The 2nd International Workshop on Autonomics and Cloud Security

FacebookTwitterLinkedInGoogle

Link: https://acs2018-200606.appspot.com/
 
When Sep 3, 2018 - Mar 3, 2018
Where The University of Trento, Italy
Submission Deadline Jul 10, 2018
Notification Due Jul 12, 2018
Final Version Due Jul 15, 2018
Categories    cloud   cybersecurity   autonomic computing   secure computing
 

Call For Papers

Cloud computing is used by many organizations to build scalable systems in different domains, such as retail, healthcare, human resources, finance, education, and government. Our society has become more dependent on the services provided by these cloud-based systems. As a result, cyber-attacks on these cloud-based systems can have a dramatic impact on all aspects of our lives.

Cloud security is an active area of research, involving many approaches for ensuring the confidentiality, availability, and integrity of data and applications hosted in the cloud. However, existing techniques for securing cloud-based systems, including autonomic-based cloud systems, are based on the assumption that people will be involved in managing them. These techniques require end user input to implement effective cybersecurity strategies to defend the systems.

The emerging area of Autonomic Cybersecurity can provide solutions that complement existing cybersecurity techniques in the cloud. The goal of Autonomic Cybersecurity is to use Autonomic Computing techniques and approaches to defend computing systems.

The Autonomics and Cloud Security workshop aims to investigate approaches to cloud security in general, including cloud-based autonomic systems, as well as autonomic cybersecurity approaches for defending cloud-based systems.

The workshop is soliciting papers in two categories, namely, the use of autonomic computing techniques to address cloud security, and techniques and approaches for securing cloud-based autonomic systems. Researchers are encouraged to submit original research contributions in these two categories, which include, but are not limited to, the following major areas:

- The use of autonomic computing techniques to address cloud security:
Challenges in autonomics and cloud security and privacy
Emerging issues in autonomic cloud security
Autonomic identity and access management in cloud computing
Autonomic cybersecurity monitoring and incident response in cloud computing
Autonomic auditing and accountability in cloud computing
Autonomic approaches to usable security in cloud computing
Autonomic security protocols in cloud computing
Autonomic approaches to privacy in the cloud
Autonomic approaches for securing data and communication in the cloud
Secure autonomics-based cloud federation
Self-adaptive security policies
Self-configuration of cloud systems
Scalable cybersecurity in the cloud
Autonomic event recovery in the cloud
Autonomic approaches to moving target defense in the cloud
Autonomic approaches to cyber defense in the cloud
Autonomic approaches to intrusion detection and prevention systems in the cloud
Techniques and approaches for building resilient cloud systems
Cybersecurity in fog and edge computing
Application of big data analytics to securing the cloud
Autonomic approaches to trusted computing

- Techniques and approaches for securing cloud-based autonomic systems:
Cybersecurity in the cloud for supporting IoT applications
Security protocols in cloud-based autonomic systems
Techniques and approaches for privacy preservation in cloud-based autonomic systems
Event detection and forensics in cloud-based autonomic systems
Techniques and approaches for cloud-based autonomic systems resiliency
Secure computing techniques for the cloud (securing data-in-processing via Homomorphic Encryption, Secure Multi-Party Computation, and other secure computing techniques).
Techniques and approaches for anomaly detection in cloud-based autonomic systems
Scalable cybersecurity in cloud-based autonomic systems
Ethical hacking and penetration testing in cloud-based autonomic systems
Case studies in securing cloud-based systems
We solicit research papers containing original research results and challenge papers motivating new research directions. In addition, the workshop will facilitate discussion and collaborative research among the participants.

Submission Instructions
The papers must be formatted in a two-column layout up to 6 pages and must follow the IEEE proceedings format. All manuscripts will be reviewed and judged on merits including originality, significance, interest, correctness, clarity, and relevance to the broader community. Submitted papers must include original work and may not be under consideration for another workshop, conference or journal during the Autonomics and Cloud Security (ACS) workshop review process. Authors should submit their papers electronically following the instructions from the ICAC 2018 conference website (ICAC 2018). At least one author of the accepted paper is expected to register and present their work during the workshop for publication in IEEEXplore.

Submission Link: https://easychair.org/conferences/?conf=acs20181

Related Resources

ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
ACM-Ei/Scopus-SCDMC 2024   2024 International Conference on Soft Computing, Data Mining and Cybersecurity (SCDMC 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SESBC 2024   5th International Conference on Software Engineering, Security and Blockchain
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
BIoT 2024   5th International Conference on Block chain and Internet of Things
ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
UCC 2024   The IEEE/ACM International Conference on Utility and Cloud Computing
C3AI 2024   The International Conference on Computing, Communication, Cybersecurity & AI