ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ACC 2014 - 2014 IEEE International Workshop on Autonomic Cloud Cybersecurity

Date2014-09-08

Deadline2014-05-07

VenueLondon, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://sesar.dti.unimi.it/ACC2014

Topics/Call fo Papers

Cloud computing services offer cost effective, scalable, and reliable outsourced platforms. Cloud adoption is becoming rapidly ubiquitous; therefore, private and sensitive data is being moved into the cloud. This move is introducing new security and privacy challenges, which should be diligently addressed in order to avoid severe security repercussions. The focus of this workshop is to offer a discussion forum about autonomous cybersecurity systems, which offer viable and well-suited solutions for cloud threat prediction, detection, mitigation, and prevention.
The workshop is part of the IEEE International Conference on Cloud and Autonomic Computing (CAC 2014), and is collocated with The 8th IEEE Self-Adaptive and Self-Organizing System Conference and The 14th IEEE Peer-to-Peer Computing Conference. We are soliciting original and unpublished results of ongoing research projects, emerging trends, uses cases, and implementation experiences in autonomous cloud cybersecurity systems and solutions.
The topics covered include, but are not limited to:
Self-protection techniques of computing systems, networks and applications
Performance evaluation and metrics of self-protection algorithms
Metrics to characterize and quantify the cybersecurity algorithms (confidentiality, integrity, and availability of autonomic systems)
Anomaly behavior analysis and discovery of autonomic systems and services
Data mining, stochastic analysis and prediction of autonomic systems and applications
Datasets and benchmarks to compare and evaluate different self-protection techniques
Autonomic prediction of cyber crime
Cloud cryptographic systems
Autonomous cyber threat mitigation methods
Cloud security protocols
Automated cloud security analysis
Cloud cybersecurity tools

Last modified: 2014-03-05 00:08:36