This seventh edition of the SETOP workshop will be held in Wroclaw (Poland), the 11th of September of 2014, in conjunction with the 19th annual European research event in Computer Security (ESORICS 2014) symposium. We invite researchers and practitioners from all countries working in autonomous security, privacy, trustworthy data systems and related areas to participate in the event. Autonomous and Spontaneous security focuses on the dynamics of system behaviour in response to threats, their detection, characterisation, diagnosis and mitigation in particular through architectural and behavioural reconfiguration. Such approaches are needed in Embedded Systems, Pervasive Computing, and Cloud environments, which bridge the physical, social, and computing worlds and challenge traditional security provisions from different perspectives. Systems must be agile and continue to operate in the presence of compromise, introspective and self-protecting rather than just hardened, resilient to more complex threats yet more vulnerable as they are physically accessible, widely heterogeneous and need to integrate long-term legacy components. Ensuring their resilience and protecting such systems at scale requires novel solutions across a broad spectrum of computational and resource environments, that integrate techniques from different areas including security, network management, machine learning, knowledge representation, control theory, stochastic analysis and software engineering amongst others.
SETOP invites submissions of novel research results and practical experiences relevant to autonomous and spontaneous security approaches including but not limited to the list below. We are looking for contributions to both technologies application areas. Examples for Relevant Application areas: Cloud Environments Critical Infrastructures Vehicular Networks Mobile Computing Mobile Ad-Hoc Networks Wireless Sensor Networks Personal Area Networks Internet of Things Examples of Relevant Technologies / Methodologies: Intrusion and Compromise detection and characterisation Anomaly detection and diagnosis Continuous Authentication Dynamic re-perimeterisation Autonomous Key-Management Context-aware security adaptation Risk assessment at run-time Trust and Reputation System resilience and Survivability Measures and Metrics of system health and resilience Proactive vs. Reactive Security Strategies Synthesis and Evaluation of response strategies Data centric self-protection Bio-inspired models for security Self-Organisation
09月11日
2014
会议日期
摘要截稿日期
注册截止日期
留言