SelfAdaptSec 2016 - International Workshop on Self-Adaptivity and Security (SelfAdaptSec) 2016
Topics/Call fo Papers
An increasingly important requirement for software-intensive systems is the ability to self-manage by adapting themselves at runtime to handle changes in their operating environment. This includes adaptation to resource variability, changing user needs, and system intrusions or faults. Such systems must configure and reconfigure, continually tune and optimize as well as protect and recover themselves while keeping their complexity hidden from the user. Self-adaptive and self-managing systems have been studied, designed and realized in a variety of domains, including autonomic computing, robotics, control systems, programming languages, software architectures, fault-tolerant computing, biological computing and recently, in self-driving automobiles.
With the increasing adoption and use of self-adaptive and self-managing systems, their security has become an area of paramount concern. This applies to both (1) security and privacy issues that arise in the design and implementation of self-adaptive systems in various application domains -- including all aspects of self-protection, intrusion detection and failure-recovery, and (2) security mechanisms that are themselves self-adaptive to changes in the operating environment.
The objective of this workshop is to bring together researchers and practitioners from many of these diverse areas to investigate, discuss, and examine thoroughly the fundamental principles, state of the art, critical challenges in the interplay between self-adaptivity and security.
Suggested Topics
Topics of interest include, but are not limited to:
1. Self-Adaptive Security
Design principles, models and mechanisms for robust self-adaptive security systems
Engineering, validation and verification of self-adaptive security software
Monitoring and measurement of security enforcement mechanisms and systems
Runtime trade-offs between security and privacy guarantees, performance and resource consumption (e.g., power consumption)
Dynamic negotiation of security guarantees and establishment of corresponding security mechanisms/protocols
Verifying the integrity and trustworthiness of entities during adaptation, establishment of trust relationships
Self-adaptive malware detection/response, intrusion detection systems, spam filtering, DDOS prevention, etc.
2. Security and Privacy Issues in Engineering Self-Adaptive systems
Novel cryptographic protocols or security mechanisms used in any self-adaptive system
Domain specific issues and mechanisms applicable to self-adaptive systems in various application domains, such as Internet-of-Things (IoT), self-driving cars, manufacturing, and robotics.
3. Self-Adaptivity and Security in Cloud Computing
Intrusion detection and the interplay between intrusion detection accuracy and elasticity
Cloud security measurement and monitoring, and scalability of monitoring mechanisms
Applications of Trusted Computing technologies in cloud platforms
Scalable integrity verification of cloud platforms (IaaS and PaaS) and use of hardware-assisted integrity verification
Compliance issues in cloud computing
Cloud security architectures and their relationship to self-adaptivity
Cloud forensics
IaaS, PaaS and SaaS security
Security mechanisms and guarantees for emerging container-cloud platforms
With the increasing adoption and use of self-adaptive and self-managing systems, their security has become an area of paramount concern. This applies to both (1) security and privacy issues that arise in the design and implementation of self-adaptive systems in various application domains -- including all aspects of self-protection, intrusion detection and failure-recovery, and (2) security mechanisms that are themselves self-adaptive to changes in the operating environment.
The objective of this workshop is to bring together researchers and practitioners from many of these diverse areas to investigate, discuss, and examine thoroughly the fundamental principles, state of the art, critical challenges in the interplay between self-adaptivity and security.
Suggested Topics
Topics of interest include, but are not limited to:
1. Self-Adaptive Security
Design principles, models and mechanisms for robust self-adaptive security systems
Engineering, validation and verification of self-adaptive security software
Monitoring and measurement of security enforcement mechanisms and systems
Runtime trade-offs between security and privacy guarantees, performance and resource consumption (e.g., power consumption)
Dynamic negotiation of security guarantees and establishment of corresponding security mechanisms/protocols
Verifying the integrity and trustworthiness of entities during adaptation, establishment of trust relationships
Self-adaptive malware detection/response, intrusion detection systems, spam filtering, DDOS prevention, etc.
2. Security and Privacy Issues in Engineering Self-Adaptive systems
Novel cryptographic protocols or security mechanisms used in any self-adaptive system
Domain specific issues and mechanisms applicable to self-adaptive systems in various application domains, such as Internet-of-Things (IoT), self-driving cars, manufacturing, and robotics.
3. Self-Adaptivity and Security in Cloud Computing
Intrusion detection and the interplay between intrusion detection accuracy and elasticity
Cloud security measurement and monitoring, and scalability of monitoring mechanisms
Applications of Trusted Computing technologies in cloud platforms
Scalable integrity verification of cloud platforms (IaaS and PaaS) and use of hardware-assisted integrity verification
Compliance issues in cloud computing
Cloud security architectures and their relationship to self-adaptivity
Cloud forensics
IaaS, PaaS and SaaS security
Security mechanisms and guarantees for emerging container-cloud platforms
Other CFPs
Last modified: 2016-04-02 21:55:48