ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Autonomics 2017 - 1st International Workshop on Autonomics and Cloud Security

Date2017-09-18 - 2017-09-22

Deadline2017-06-25

VenueUniversity of Arizona, Tucson, Arizona, USA - United States USA - United States

Keywords

Websitehttps://autonomic-conference.org

Topics/Call fo Papers

Scope and Topics
· The use of autonomic computing techniques to address cloud security
§ Challenges in autonomics and cloud security and privacy
§ Emerging issues in autonomic cloud security
§ Autonomic identity and access management in cloud computing
§ Autonomic cybersecurity monitoring and incident response in cloud computing
§ Autonomic auditing and accountability in cloud computing
§ Autonomic approaches to usable security in cloud computing
§ Autonomic security protocols in cloud computing
§ Autonomic approaches to privacy in the cloud
§ Autonomic approaches for securing data and communication in the cloud
§ Secure autonomics-based cloud federation
§ Self-adaptive security policies
§ Self-configuration of cloud systems
§ Scalable cybersecurity in the cloud
§ Autonomic event recovery in the cloud
§ Autonomic approaches to moving target defense in the cloud
§ Autonomic approaches to cyber defense in the cloud
§ Autonomic approaches to intrusion detection and prevention systems in the cloud
§ Techniques and approaches for building resilient cloud systems
§ Cybersecurity in fog and edge computing
§ Application of big data analytics to securing the cloud
§ Autonomic approaches to trusted computing
· Techniques and approaches for securing cloud-based autonomic systems
§ Cybersecurity in the cloud for supporting IoT applications
§ Security protocols in cloud-based autonomic systems
§ Techniques and approaches for privacy preservation in cloud-based autonomic systems
§ Event detection and forensics in cloud-based autonomic systems
§ Techniques and approaches for cloud-based autonomic systems resiliency
§ Secure computing techniques for the cloud (securing data-in-processing via Homomorphic Encryption, Secure Multi-Party Computation, and other secure computing techniques).
§ Techniques and approaches for anomaly detection in cloud-based autonomic systems
§ Scalable cybersecurity in cloud-based autonomic systems
§ Ethical hacking and penetration testing in cloud-based autonomic systems
§ Case studies in securing cloud-based systems
Important Dates
Ÿ Paper submission: June 30, 2017 Ÿ Author notification: July 11, 2017 Ÿ Camera-ready version: July 21, 2017

Last modified: 2017-06-22 23:32:16