We are pleased to announce the following two calls for papers:
The 1st International Workshop on Autonomics and Cloud Security (ACS 2017) Co-located with the 2017 IEEE International Conference on Cloud and Autonomic Computing (ICCAC) and the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2017)
The University of Arizona, Tucson, AZ, USA -- September 18-22, 2017
http://www.autonomic-conference.org/iccac-2017/resources/ACS/ http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=64433%C2%A9ownerid=...
Cloud computing is used by many organizations to build scalable systems in different domains, such as retail, healthcare, human resources, finance, education, and government. Our society has become more dependent on the services provided by these cloud-based systems. As a result, cyber-attacks on these cloud-based systems can have a dramatic impact on all aspects of our lives.
Cloud security is an active area of research, involving many approaches for ensuring the confidentiality, availability, and integrity of data and applications hosted in the cloud. However, existing techniques for securing cloud-based systems, including autonomic-based cloud systems, are based on the assumption that people will be involved in managing them. These techniques require end user input to implement effective cybersecurity strategies to defend the systems.
The emerging area of Autonomic Cybersecurity can provide solutions that complement existing cybersecurity techniques in the cloud. The goal of Autonomic Cybersecurity is to use Autonomic Computing techniques and approaches to defend computing systems.
The Autonomics and Cloud Security workshop aims to investigate approaches to cloud security in general, including cloud-based autonomic systems, as well as autonomic cybersecurity approaches for defending cloud-based systems.
The workshop is soliciting papers in two categories, namely, the use of autonomic computing techniques to address cloud security, and techniques and approaches for securing cloud-based autonomic systems. Researchers are encouraged to submit original research contributions in these two categories, which include, but are not limited to, the following major areas:
The use of autonomic computing techniques to address cloud security: -Challenges in autonomics and cloud security and privacy -Emerging issues in autonomic cloud security -Autonomic identity and access management in cloud computing -Autonomic cybersecurity monitoring and incident response in cloud computing -Autonomic auditing and accountability in cloud computing -Autonomic approaches to usable security in cloud computing -Autonomic security protocols in cloud computing -Autonomic approaches to privacy in the cloud -Autonomic approaches for securing data and communication in the cloud -Secure autonomics-based cloud federation -Self-adaptive security policies -Self-configuration of cloud systems -Scalable cybersecurity in the cloud -Autonomic event recovery in the cloud -Autonomic approaches to moving target defense in the cloud -Autonomic approaches to cyber defense in the cloud -Autonomic approaches to intrusion detection and prevention systems in the cloud -Techniques and approaches for building resilient cloud systems -Cybersecurity in fog and edge computing -Application of big data analytics to securing the cloud -Autonomic approaches to trusted computing
Techniques and approaches for securing cloud-based autonomic systems: -Cybersecurity in the cloud for supporting IoT applications -Security protocols in cloud-based autonomic systems -Techniques and approaches for privacy preservation in cloud-based autonomic systems -Event detection and forensics in cloud-based autonomic systems -Techniques and approaches for cloud-based autonomic systems resiliency -Secure computing techniques for the cloud (securing data-in-processing via Homomorphic --Encryption, Secure Multi-Party Computation, and other secure computing techniques). -Techniques and approaches for anomaly detection in cloud-based autonomic systems -Scalable cybersecurity in cloud-based autonomic systems -Ethical hacking and penetration testing in cloud-based autonomic systems -Case studies in securing cloud-based systems
We solicit research papers containing original research results and challenge papers motivating new research directions. In addition, the workshop will facilitate discussion and collaborative research among the participants.
Submissions may be made via: https://easychair.org/conferences/?conf=acs17 .
UPDATE: A special issue on Cluster Computing (The Journal of Networks, Software Tools and Applications) will include an extension of the best papers of all the workshops that will be held in conjunction with ICCAC 2017.
Organization: General Chair Mamadou H. Diallo -- SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
Program Co-Chairs Michael August -- SPAWAR Systems Center Pacific, U.S. Department of Defense, USA Sherif Abdelwahed -- Mississippi State University, USA
Technical Program Commmittee Kim-Kwang Raymond Choo -- The University of Texas at San Antonio, USA Tiago Cruz -- University of Coimbra, Portugal Song Fu -- University of North Texas, USA Sokratis K. Katsikas -- Norwegian University of Science & Technology, Norway Ryan Ko -- University of Waikato, New Zealand Thomas Moyer -- MIT Lincoln Laboratory, USA Stacy Prowell -- Oak Ridge National Laboratory, USA Khaled Salah -- Khalifa University of Science, Technology & Research, UAE Sachin Shetty -- Old Dominion University, USA MORE TO COME
Publicity and Web Chair Christopher Graves -- SPAWAR Systems Center Pacific, U.S. Department of Defense, USA Scott M. Slayback -- SPAWAR Systems Center Pacific, U.S. Department of Defense, USA
Contact:
General Chair mamadou.h.diallo@navy.mil Publicity and Web Chair christopher.t.graves@navy.mil
And
*The 1st International Workshop on Multimedia Privacy and Security*Held on 30 October, 2017 in conjunction with the 24th ACM Conference on Computer and Communication Security (CCS 2017)Hotel Sheraton, Downtown Dallas, Texas, USA
https://centers.njit.edu/cybersecurity/CCS_MPS2017/
*Scope:* We live in an interconnected world where ever increasing multitudes of devices and people can be connected to each other by intelligent algorithms, apps, social networks, and the infrastructure set by Internet of Things (IoT). As more people and their devices are connected without much restriction, the issues of security, privacy, and trust remain a challenge. Multimedia in IoT services should provide a robust and resilient security platforms and solutions against any unauthorized access. Recent literature shows increased concerns about hacking, security breaches, data manipulation, social engineering, and new attack methods. Malware can be hidden within multimedia files and visiting infected websites can trigger its download to victims’ machines. There are a multitude of techniques to steal personal information and other sensitive media for unauthorized dissemination; imposters/identity thefts are common in social networks. In order to demonstrate the effectiveness of resilient security and privacy solutions, methods such as new standards, advance cryptography, improved algorithms for intrusion detection, personalized privacy, and isolation of questionable or malicious files can be used independently or all together to minimize the threats.
Multimedia has expanded beyond the scope its original definition. With the rise of social media, large quantities of multimedia (e.g., pictures, videos, data, analytics and personal information) can be created in a short period of time. When all these data are stored in a cloud environment, many people can connect to these services for viewing, sharing, commenting, and storing information. IoT represents a collection of devices, platforms, and software that allow people to store and share data in the cloud and also connects different types of clouds altogether. Hence, multimedia in the IoT serves a significant purpose as many people’s updates, status, locations, and live actions can be seen, disseminated, tracked, commented on, and monitored in near real time. IoT opens up many possibilities since more people can broadcast themselves and allow their networks to view and share in their lives. There are also increased fraudulent activities, cybercrimes, unauthorized access, malicious attacks, phishing, and impersonating/stealing identities. This presents challenges for existing areas such as access control, authentication, data leakage, permission, social engineering, denial of service, and identity management for the attackers to impose identity, steal information, and manipulate data in the IoT environment. Challenges also include new problems such as large scale attacks and prevention, the strength of security protection (e.g., common encryption algorithms), hiding malware with multimedia, location-based privacy with high accuracy and anonymity, underground criminal networks, and hidden security breaches. Our workshop will allow a specific venue for the publication of work addressing these concerns, specific to the IoT ecosystem. We invite research into new and innovative methods, techniques, and proofs‐of‐concepts supported by strong theory/algorithms and simulation/experiments to submit papers for this workshop.
*Topics of interest include* (but are not limited to):
- Access control and authentication - IoT and Social Network security and privacy - Encryption of all types in multimedia, including homomorphic encryption and multi-party computation - Information Forensics - Data Leakage and Exfiltration - Intrusion Detection/Prevention Systems - Largescale simulations and experiments for security - Location-based privacy and other privacy-enhancing technologies - Risk Mitigation, reduction, and simulation - Identity management and standards - Data security, recovery, and segregation - Secure integration of IoT and social networks - Steganography - Internet-connected cameras and Multiview Systems - Human Factors in Multimedia Security and Privacy - Emerging Privacy and Security Threats in Multimedia
*Submission:* All papers will be submitted through EasyChair: https://easychair.org/conferences/?conf=mps2017. We are accepting Full, Short, and Demo Papers. Full Papers (10-12 pages) will be allotted 25 minutes for their presentations, plus 5 minutes for questions. Short Papers (6-8 pages) will be allotted 20 minutes for their presentations, plus 5 minutes for questions. Demo Papers (4-8 pages) will be allotted 15 minutes for their presentations, 10 minutes for a code review, and 5 minutes for questions. Submissions should be formatted according to the CCS 2017 formatting requirements provided at https://www.sigsac.org/ccs/CCS2017/#format. All submissions will be anonymized for a double-blind review, with final acceptance decisions made by the organizers based on reviewer comments.
*Important Dates:*
- 4 August, 2017 – Submission Deadline - 4 September, 2017 – Author Notifications - 17 September, 2017 – Camera-Ready Papers Due
*Organizing Committee:*
- Chair – Mr. Roger Hallman, SPAWAR Systems Center Pacific, San Diego, Ca, USA - Co-chair – Professor Kurt Rohloff, New Jersey Institute of Technology, Newark, NJ, USA - Co-chair – Professor Victor Chang, Xi’an Jiaotong Liverpool University, Suzhou, China
*Program Committee:*
- Professor An Braeken – Vrije Universiteit Brussel, Belgium - Professor Tiago Cruz – University of Coimbra, Portugal - Dr. Jason R.C. Nurse – University of Oxford, United Kingdom - Professor Giovanni Pau – Kore University of Enna, Italy - Dr. Jose Romero-Mariona -- SPAWAR Systems Center Pacific, USA - TBD
*Contact:* mps2017@easychair.org