<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<div dir="ltr">
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">[Apologies for cross and
multiple postings]</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">******************************<wbr>******************************<wbr>**********</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace"> 3rd
IEEE/IFIP International Workshop on </font></div>
<div><font face="monospace, monospace"> Security for Emerging
Distributed Network Technologies (DISSECT) </font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace"> <a
href="http://www.dissect.vcu.edu/2017/" target="_blank">http://www.dissect.vcu.edu/<wbr>2017/</a>
</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace"> In
conjunction with IEEE/IFIP </font></div>
<div><font face="monospace, monospace"> International Symposium
on Integrated Network Management (IM 2017) </font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace"> Lisbon,
Portugal, 8 or 12 MAY 2017 </font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace"> * Paper Registration:
December 15th, 2016</font></div>
<div><font face="monospace, monospace"> * Paper Submission:
December 19th, 2016</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">******************************<wbr>******************************<wbr>**********</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">*** Authors of selected
papers will be invited to submit an extended</font></div>
<div><font face="monospace, monospace">version to a Special
Issue of the International Journal </font><span
style="font-family:monospace,monospace">on Network</span></div>
<div><span style="font-family:monospace,monospace">Management </span><span
style="font-family:monospace,monospace">(</span><a
href="http://goo.gl/4tIMhV" target="_blank"
style="font-family:monospace,monospace">http://goo.gl/4tIMhV</a><span
style="font-family:monospace,monospace">) ***</span></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">Emerging open networking
technologies and paradigms, such as</font></div>
<div><font face="monospace, monospace">Software-Defined
Networking, Network Function Virtualization, and</font></div>
<div><font face="monospace, monospace">Programmable Networks,
are reshaping the way networks are</font></div>
<div><font face="monospace, monospace">designed, deployed, and
managed. The benefits are manifold, including</font></div>
<div><font face="monospace, monospace">an unprecedented
flexibility for network operation and management, and</font></div>
<div><font face="monospace, monospace">a favorable environment for
delivering innovative network applications</font></div>
<div><font face="monospace, monospace">and services. However,
this paradigm shift brings a multitude of</font></div>
<div><font face="monospace, monospace">security challenges that
have to be addressed in order to provide</font></div>
<div><font face="monospace, monospace">secure, trustworthy, and
privacy-preserving data communication and</font></div>
<div><font face="monospace, monospace">network services.
Addressing these challenges may require not only</font></div>
<div><font face="monospace, monospace">revisiting existing
solutions (e.g., for intrusion detection, privacy</font></div>
<div><font face="monospace, monospace">preserving, and resilience
against attacks), but also designing novel</font></div>
<div><font face="monospace, monospace">security and resilience
schemes tailored to the specific design of</font></div>
<div><font face="monospace, monospace">open networking
technologies and infrastructures.</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">DISSECT 2017 will put focus
on security issues and challenges arising</font></div>
<div><font face="monospace, monospace">with the emergence of
novel networking technologies and paradigms,</font></div>
<div><font face="monospace, monospace">towards a secure and
integrated management in the cloud and 5G era.</font></div>
<div><font face="monospace, monospace">The workshop will shed
light on new challenges and present current</font></div>
<div><font face="monospace, monospace">research on the various
security aspects of next-generation networking</font></div>
<div><font face="monospace, monospace">technologies and service
management frameworks.</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">DISSECT will offer a
venue for bringing together students,</font></div>
<div><font face="monospace, monospace">researchers, and
professionals from academia and industry sharing</font></div>
<div><font face="monospace, monospace">common interest on
security challenges related to the design and</font></div>
<div><font face="monospace, monospace">management of the
distributed networks and infrastructures. DISSECT is</font></div>
<div><font face="monospace, monospace">intended to (1) discussing
these challenges as well as future trends</font></div>
<div><font face="monospace, monospace">on security management,
(2) present and discuss work-in-progress</font></div>
<div><font face="monospace, monospace">security-related research
on cutting-edge technologies, and (3)</font></div>
<div><font face="monospace, monospace">strengthening collaboration
and research ties among peers.</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">------------------------------<wbr>------------------------------<wbr>----------</font></div>
<div><font face="monospace, monospace">Topics of Interest:</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">In this workshop, the
research community from industry and academia</font></div>
<div><font face="monospace, monospace">will be invited to
contribute with manuscripts describing novel,</font></div>
<div><font face="monospace, monospace">work-in-progress research
on the design of solutions to relevant</font></div>
<div><font face="monospace, monospace">security issues on a
wide variety of next generation networking</font></div>
<div><font face="monospace, monospace">technologies. The topics of
interest of the workshop include, but are</font></div>
<div><font face="monospace, monospace">not limited to</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">- Secure and resilient
design and deployment of open networking</font></div>
<div><font face="monospace, monospace">technologies</font></div>
<div><font face="monospace, monospace">- Privacy-preserving
solutions</font></div>
<div><font face="monospace, monospace">- Security models and
threats</font></div>
<div><font face="monospace, monospace">- Security and privacy
properties and policies</font></div>
<div><font face="monospace, monospace">- Verification and
enforcement of security properties</font></div>
<div><font face="monospace, monospace">- Trust and identity
management</font></div>
<div><font face="monospace, monospace">- NFV- based security
functions and services</font></div>
<div><font face="monospace, monospace">- Security of
software-defined infrastructures, protocols and</font></div>
<div><font face="monospace, monospace">interfaces</font></div>
<div><font face="monospace, monospace">- Threat modeling </font></div>
<div><font face="monospace, monospace">- Security and availability
management</font></div>
<div><font face="monospace, monospace">- Security for Internet of
Things</font></div>
<div><font face="monospace, monospace">- Intrusion detection,
tolerance, and prevention</font></div>
<div><font face="monospace, monospace">- Network forensics and
auditing</font></div>
<div><font face="monospace, monospace">- Detection and resilience
against large-scale distributed attacks</font></div>
<div><font face="monospace, monospace">- Security of programmable
components</font></div>
<div><font face="monospace, monospace">- Security-related business
and legal aspects</font></div>
<div><font face="monospace, monospace">- Security challenges and
trends for open networking technologies</font></div>
<div><font face="monospace, monospace">- Secure programmable data
plane</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">------------------------------<wbr>------------------------------<wbr>----------</font></div>
<div><font face="monospace, monospace">Author Instructions:</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">All submitted papers must
present original, unpublished research or</font></div>
<div><font face="monospace, monospace">experiences. Papers under
review elsewhere must not be submitted to</font></div>
<div><font face="monospace, monospace">the workshop. All
contributions must be submitted in PDF format via</font></div>
<div><font face="monospace, monospace"><a
href="https://submissoes.sbc.org.br/im2017_dissect2017"
target="_blank">https://submissoes.sbc.org.br/<wbr>im2017_dissect2017</a>
.</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">Each paper must be limited
to 6 pages using IEEE 2-column style and</font></div>
<div><font face="monospace, monospace">will be subject to a
peer-review process. Accepted papers will be</font></div>
<div><font face="monospace, monospace">published in the IEEE
Xplore Digital Library. Any paper not presented</font></div>
<div><font face="monospace, monospace">in the workshop by one its
authors will be withdrawn from IEEE Xplore.</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">------------------------------<wbr>------------------------------<wbr>----------</font></div>
<div><font face="monospace, monospace">Important Dates:</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">- Paper Registration
Deadline: December 15th,2016</font></div>
<div><font face="monospace, monospace">- Paper Submission
Deadline: December 19th, 2016</font></div>
<div><font face="monospace, monospace">- Notification of
Acceptance: January 30th, 2017</font></div>
<div><font face="monospace, monospace">- Camera-Ready Papers:
February 15th, 2017</font></div>
<div><font face="monospace, monospace">- Workshop Day: 8 or 12 May
2017</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">------------------------------<wbr>------------------------------<wbr>----------</font></div>
<div><font face="monospace, monospace">Workshop Co-Chairs:</font></div>
<div><font face="monospace, monospace"><br>
</font></div>
<div><font face="monospace, monospace">- Carol Fung, Virginia
Commonwealth University, USA</font></div>
<div><font face="monospace, monospace">- Mohamed Faten Zhani,
École de Technologie Supérieure, Canada</font></div>
<div><font face="monospace, monospace">- Weverton Cordeiro, UFRGS,
Brazil</font></div>
<div><font face="monospace, monospace">- Jérôme François, Inria
Nancy Grand Est, France</font></div>
<div><br>
</div>
</div>
</body>
</html>