Autonomics 2017 - 1st International Workshop on Autonomics and Cloud Security
Date2017-09-18 - 2017-09-22
Deadline2017-06-25
VenueUniversity of Arizona, Tucson, Arizona, USA - United States
Keywords
Topics/Call fo Papers
Scope and Topics
· The use of autonomic computing techniques to address cloud security
§ Challenges in autonomics and cloud security and privacy
§ Emerging issues in autonomic cloud security
§ Autonomic identity and access management in cloud computing
§ Autonomic cybersecurity monitoring and incident response in cloud computing
§ Autonomic auditing and accountability in cloud computing
§ Autonomic approaches to usable security in cloud computing
§ Autonomic security protocols in cloud computing
§ Autonomic approaches to privacy in the cloud
§ Autonomic approaches for securing data and communication in the cloud
§ Secure autonomics-based cloud federation
§ Self-adaptive security policies
§ Self-configuration of cloud systems
§ Scalable cybersecurity in the cloud
§ Autonomic event recovery in the cloud
§ Autonomic approaches to moving target defense in the cloud
§ Autonomic approaches to cyber defense in the cloud
§ Autonomic approaches to intrusion detection and prevention systems in the cloud
§ Techniques and approaches for building resilient cloud systems
§ Cybersecurity in fog and edge computing
§ Application of big data analytics to securing the cloud
§ Autonomic approaches to trusted computing
· Techniques and approaches for securing cloud-based autonomic systems
§ Cybersecurity in the cloud for supporting IoT applications
§ Security protocols in cloud-based autonomic systems
§ Techniques and approaches for privacy preservation in cloud-based autonomic systems
§ Event detection and forensics in cloud-based autonomic systems
§ Techniques and approaches for cloud-based autonomic systems resiliency
§ Secure computing techniques for the cloud (securing data-in-processing via Homomorphic Encryption, Secure Multi-Party Computation, and other secure computing techniques).
§ Techniques and approaches for anomaly detection in cloud-based autonomic systems
§ Scalable cybersecurity in cloud-based autonomic systems
§ Ethical hacking and penetration testing in cloud-based autonomic systems
§ Case studies in securing cloud-based systems
Important Dates
Ÿ Paper submission: June 30, 2017 Ÿ Author notification: July 11, 2017 Ÿ Camera-ready version: July 21, 2017
· The use of autonomic computing techniques to address cloud security
§ Challenges in autonomics and cloud security and privacy
§ Emerging issues in autonomic cloud security
§ Autonomic identity and access management in cloud computing
§ Autonomic cybersecurity monitoring and incident response in cloud computing
§ Autonomic auditing and accountability in cloud computing
§ Autonomic approaches to usable security in cloud computing
§ Autonomic security protocols in cloud computing
§ Autonomic approaches to privacy in the cloud
§ Autonomic approaches for securing data and communication in the cloud
§ Secure autonomics-based cloud federation
§ Self-adaptive security policies
§ Self-configuration of cloud systems
§ Scalable cybersecurity in the cloud
§ Autonomic event recovery in the cloud
§ Autonomic approaches to moving target defense in the cloud
§ Autonomic approaches to cyber defense in the cloud
§ Autonomic approaches to intrusion detection and prevention systems in the cloud
§ Techniques and approaches for building resilient cloud systems
§ Cybersecurity in fog and edge computing
§ Application of big data analytics to securing the cloud
§ Autonomic approaches to trusted computing
· Techniques and approaches for securing cloud-based autonomic systems
§ Cybersecurity in the cloud for supporting IoT applications
§ Security protocols in cloud-based autonomic systems
§ Techniques and approaches for privacy preservation in cloud-based autonomic systems
§ Event detection and forensics in cloud-based autonomic systems
§ Techniques and approaches for cloud-based autonomic systems resiliency
§ Secure computing techniques for the cloud (securing data-in-processing via Homomorphic Encryption, Secure Multi-Party Computation, and other secure computing techniques).
§ Techniques and approaches for anomaly detection in cloud-based autonomic systems
§ Scalable cybersecurity in cloud-based autonomic systems
§ Ethical hacking and penetration testing in cloud-based autonomic systems
§ Case studies in securing cloud-based systems
Important Dates
Ÿ Paper submission: June 30, 2017 Ÿ Author notification: July 11, 2017 Ÿ Camera-ready version: July 21, 2017
Other CFPs
- Workshop on InfoSymbiotics: DDDAS Dynamic Data Driven Applications Systems
- IEEE Workshop on Automation of Cloud Configuration and Operations (ACCO)
- 13th International Conference on Advanced Data Mining and Applications (ADMA)
- 12th International Workshop on Data Privacy Management (DPM 2017)
- Third International Workshop on Data Analytics and Emerging Services (DAES)
Last modified: 2017-06-22 23:32:16