ACS 2018: 2nd International Workshop on Autonomics and Cloud Security The University of Trento Trento, Italy, September 3-7, 2018 |
Conference website | https://acs2018-200606.appspot.com/ |
Submission link | https://easychair.org/conferences/?conf=acs20181 |
Abstract registration deadline | June 6, 2018 |
Submission deadline | June 12, 2018 |
Cloud computing is used by many organizations to build scalable systems in different domains, such as retail, healthcare, human resources, finance, education, and government. Our society has become more dependent on the services provided by these cloud-based systems. As a result, cyber-attacks on these cloud-based systems can have a dramatic impact on all aspects of our lives.
Cloud security is an active area of research, involving many approaches for ensuring the confidentiality, availability, and integrity of data and applications hosted in the cloud. However, existing techniques for securing cloud-based systems, including autonomic-based cloud systems, are based on the assumption that people will be involved in managing them. These techniques require end user input to implement effective cybersecurity strategies to defend the systems.
The emerging area of Autonomic Cybersecurity can provide solutions that complement existing cybersecurity techniques in the cloud. The goal of Autonomic Cybersecurity is to use Autonomic Computing techniques and approaches to defend computing systems.
The Autonomics and Cloud Security workshop aims to investigate approaches to cloud security in general, including cloud-based autonomic systems, as well as autonomic cybersecurity approaches for defending cloud-based systems.
Submission Guidelines
The papers must be formatted in a two-column layout up to 6 pages and must follow the IEEE proceedings format. All manuscripts will be reviewed and judged on merits including originality, significance, interest, correctness, clarity, and relevance to the broader community. Submitted papers must include original work and may not be under consideration for another workshop, conference or journal during the Autonomics and Cloud Security (ACS) workshop review process. Authors should submit their papers electronically following the instructions from the ICAC 2018 conference website (ICAC 2018). At least one author of the accepted paper is expected to register and present their work during the workshop for publication in IEEEXplore.
Submission Link: https://easychair.org/conferences/?conf=acs20181
List of Topics
- The use of autonomic computing techniques to address cloud security
- Challenges in autonomics and cloud security and privacy
- Emerging issues in autonomic cloud security
- Autonomic identity and access management in cloud computing
- Autonomic cybersecurity monitoring and incident response in cloud computing
- Autonomic auditing and accountability in cloud computing
- Autonomic approaches to usable security in cloud computing
- Autonomic security protocols in cloud computing
- Autonomic approaches to privacy in the cloud
- Autonomic approaches for securing data and communication in the cloud
- Secure autonomics-based cloud federation
- Self-adaptive security policies
- Self-configuration of cloud systems
- Scalable cybersecurity in the cloud
- Autonomic event recovery in the cloud
- Autonomic approaches to moving target defense in the cloud
- Autonomic approaches to cyber defense in the cloud
- Autonomic approaches to intrusion detection and prevention systems in the cloud
- Techniques and approaches for building resilient cloud systems
- Cybersecurity in fog and edge computing
- Application of big data analytics to securing the cloud
- Autonomic approaches to trusted computing
- Techniques and approaches for securing cloud-based autonomic systems
- Cybersecurity in the cloud for supporting IoT applications
- Security protocols in cloud-based autonomic systems
- Techniques and approaches for privacy preservation in cloud-based autonomic systems
- Event detection and forensics in cloud-based autonomic systems
- Techniques and approaches for cloud-based autonomic systems resiliency
- Secure computing techniques for the cloud (securing data-in-processing via Homomorphic Encryption, Secure Multi-Party Computation, and other secure computing techniques).
- Techniques and approaches for anomaly detection in cloud-based autonomic systems
- Scalable cybersecurity in cloud-based autonomic systems
- Ethical hacking and penetration testing in cloud-based autonomic systems
- Case studies in securing cloud-based systems
Committees
Organizing committee
General Chair
-
Mamadou H. Diallo, SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
Program Co-Chairs
-
Michael August, SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
-
Sherif Abdelwahed, Mississippi State University, USA
-
Youssif Al-Nashif, Florida Polytechnic University, USA
Technical Program Commmittee
-
Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA
-
Tiago Cruz, University of Coimbra, Portugal
-
Song Fu, University of North Texas, USA
-
Roger Hallman, SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
-
Sokratis K. Katsikas, Norwegian University of Science & Technology, Norway
-
Ryan Ko, University of Waikato, New Zealand
-
Thomas Moyer, MIT Lincoln Laboratory, USA
-
Nuno Neves, Universidade de Lisboa, Portugal
-
Jason Nurse, Department of Computer Science, University of Oxford, UK
-
Stacy Prowell, Oak Ridge National Laboratory, USA
-
Muthu Ramachandran, Leeds Beckett University, UK
-
Khaled Salah, Khalifa University of Science, Technology & Research, UAE
-
Sachin Shetty, Old Dominion University, USA
-
Vijay Varadharajan, University of Newcastle, Australia
-
Verinder Rana, SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
Publicity and Web Chair
-
Christopher Graves, SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
Venue
ACS 2018
In conjunction with the 15th IEEE International Conference on Autonomic Computing (ICAC 2018) and the 12th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2018)
The University of Trento, Italy -- September 3-7, 2018
Contact
All questions about submissions should be emailed to
General Chair
mamadou.h.diallo@navy.mil
Publicity and Web Chair
christopher.t.graves@navy.mil