[aims-announce] CFP: 7th SETOP International Workshop on Autonomous and Spontaneous Security

Lupu, Emil C e.c.lupu at imperial.ac.uk
Thu Mar 27 02:20:39 CET 2014



 7th SETOP International Workshop on Autonomous and Spontaneous Security
                    11th September 2014, Wroclaw, Poland
                           http://www.setop.info

Scope: 
Autonomous and Spontaneous security focuses on the dynamics of system behaviour in response to threats, their detection, characterisation, diagnosis and mitigation in particular through architectural and behavioural reconfiguration. Such approaches are needed in Embedded Systems, Pervasive Computing, and Cloud environments, which bridge the physical, social, and computing worlds and challenge traditional security provisions from different perspectives. Systems must be agile and continue to operate in the presence of compromise, introspective and self-protecting rather than just hardened, resilient to more complex threats yet more vulnerable as they are physically accessible, widely heterogeneous and need to integrate long-term legacy components. 

Ensuring their resilience and protecting such systems at scale requires novel solutions across a broad spectrum of computational and resource environments, that integrate techniques from different areas including security, network management, machine learning, knowledge representation, control theory, stochastic analysis and software engineering amongst others.

SETOP invites submissions of novel research results and practical experiences relevant to autonomous and spontaneous security approaches including but not limited to the list below.  We are looking for contributions to both technologies application areas. 

Examples for Relevant Application areas:  
• Cloud Environments
• Critical Infrastructures
• Vehicular Networks
• Mobile Computing
• Mobile Ad-Hoc Networks	
• Wireless Sensor Networks
• Personal Area Networks
• Internet of Things

Examples of Relevant Technologies / Methodologies:
• Intrusion and Compromise detection and characterisation
• Anomaly detection and diagnosis 
• Continuous Authentication
• Dynamic re-perimeterisation 
• Autonomous Key-Management 
• Context-aware security adaptation
• Risk assessment at run-time
• Trust and Reputation 
• System resilience and Survivability
• Measures and Metrics of system health and resilience
• Proactive vs. Reactive Security Strategies
• Synthesis and Evaluation of response strategies 
• Data centric self-protection
• Bio-inspired models for security
• Self-Organisation 

Venue:
The event will be held in conjunction with ESORICS 2014 and hosted in Wroclaw, historical capital of Silesia, which at various times has been part of the Kingdom of Poland, Bohemia, the Austrian Empire, Prussia, and Germany. 

Submissions Guidelines: 
The proceedings will be published by Springer in the LNCS series. Submissions in English, of at most 15 pages and complying with the LNCS formatting must be submitted before May 21 at  https://www.easychair.org/conferences/?conf=setop2014. At least one author of each accepted paper must register and present the paper at the workshop.

Important Dates:
• Paper Submission: May 21, 2014
• Author Notification: July 10, 2014
• Camera Ready Version: August 7, 2014


General Chair: Frédéric Cuppens (Télécom Bretagne, FR)

Program Committee Chairs:

Emil Lupu (Imperial College London, UK)
Joachim Posegga (University of Passau, DE)





More information about the aims-announce mailing list