ACS 2017 : The 1st International Workshop on Autonomics and Cloud Security

The 1st International Workshop on Autonomics and Cloud Security (ACS 2017)
Co-located with the 2017 IEEE International Conference on Cloud and Autonomic Computing (ICCAC) and the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2017)

The University of Arizona, Tucson, AZ, USA -- September 18-22, 2017

Cloud computing is used by many organizations to build scalable systems in different domains, such as retail, healthcare, human resources, finance, education, and government. Our society has become more dependent on the services provided by these cloud-based systems. As a result, cyber-attacks on these cloud-based systems can have a dramatic impact on all aspects of our lives.

Cloud security is an active area of research, involving many approaches for ensuring the confidentiality, availability, and integrity of data and applications hosted in the cloud. However, existing techniques for securing cloud-based systems, including autonomic-based cloud systems, are based on the assumption that people will be involved in managing them. These techniques require end user input to implement effective cybersecurity strategies to defend the systems.

The emerging area of Autonomic Cybersecurity can provide solutions that complement existing cybersecurity techniques in the cloud. The goal of Autonomic Cybersecurity is to use Autonomic Computing techniques and approaches to defend computing systems.

The Autonomics and Cloud Security workshop aims to investigate approaches to cloud security in general, including cloud-based autonomic systems, as well as autonomic cybersecurity approaches for defending cloud-based systems.

The workshop is soliciting papers in two categories, namely, the use of autonomic computing techniques to address cloud security, and techniques and approaches for securing cloud-based autonomic systems. Researchers are encouraged to submit original research contributions in these two categories, which include, but are not limited to, the following major areas:

The use of autonomic computing techniques to address cloud security:
-Challenges in autonomics and cloud security and privacy
-Emerging issues in autonomic cloud security
-Autonomic identity and access management in cloud computing
-Autonomic cybersecurity monitoring and incident response in cloud computing
-Autonomic auditing and accountability in cloud computing
-Autonomic approaches to usable security in cloud computing
-Autonomic security protocols in cloud computing
-Autonomic approaches to privacy in the cloud
-Autonomic approaches for securing data and communication in the cloud
-Secure autonomics-based cloud federation
-Self-adaptive security policies
-Self-configuration of cloud systems
-Scalable cybersecurity in the cloud
-Autonomic event recovery in the cloud
-Autonomic approaches to moving target defense in the cloud
-Autonomic approaches to cyber defense in the cloud
-Autonomic approaches to intrusion detection and prevention systems in the cloud
-Techniques and approaches for building resilient cloud systems
-Cybersecurity in fog and edge computing
-Application of big data analytics to securing the cloud
-Autonomic approaches to trusted computing

Techniques and approaches for securing cloud-based autonomic systems:
-Cybersecurity in the cloud for supporting IoT applications
-Security protocols in cloud-based autonomic systems
-Techniques and approaches for privacy preservation in cloud-based autonomic systems
-Event detection and forensics in cloud-based autonomic systems
-Techniques and approaches for cloud-based autonomic systems resiliency
-Secure computing techniques for the cloud (securing data-in-processing via Homomorphic --Encryption, Secure Multi-Party Computation, and other secure computing techniques).
-Techniques and approaches for anomaly detection in cloud-based autonomic systems
-Scalable cybersecurity in cloud-based autonomic systems
-Ethical hacking and penetration testing in cloud-based autonomic systems
-Case studies in securing cloud-based systems

We solicit research papers containing original research results and challenge papers motivating new research directions. In addition, the workshop will facilitate discussion and collaborative research among the participants.

UPDATE: A special issue on Cluster Computing (The Journal of Networks, Software Tools and Applications) will include an extension of the best papers of all the workshops that will be held in conjunction with ICCAC 2017.

Organization:
General Chair
Mamadou H. Diallo -- SPAWAR Systems Center Pacific, U.S. Department of Defense, USA

Program Co-Chairs
Michael August -- SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
Sherif Abdelwahed -- Mississippi State University, USA

Technical Program Commmittee
Kim-Kwang Raymond Choo -- The University of Texas at San Antonio, USA
Tiago Cruz -- University of Coimbra, Portugal
Song Fu -- University of North Texas, USA
Sokratis K. Katsikas -- Norwegian University of Science & Technology, Norway
Ryan Ko -- University of Waikato, New Zealand
Thomas Moyer -- MIT Lincoln Laboratory, USA
Stacy Prowell -- Oak Ridge National Laboratory, USA
Khaled Salah -- Khalifa University of Science, Technology & Research, UAE
Sachin Shetty -- Old Dominion University, USA
MORE TO COME

Publicity and Web Chair
Christopher Graves -- SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
Scott M. Slayback -- SPAWAR Systems Center Pacific, U.S. Department of Defense, USA

Contact:

General Chair
[email protected]
Publicity and Web Chair
[email protected]

Sponsored Conferences

Related Conferences

Need more targetted audience? 90% OFF.

PROMOTE NOW
Quick Links
Resources
The Conference Alerts

If you have any suggestion / complain to improve this community, please write us - [email protected]