SAFECONFIG 2011 - SafeConfig 2011: 4th Symposium on Configuration Analytics and Automation
View: 6006
Website |
Edit Freely
Category SAFECONFIG 2011
Deadline: September 19, 2011 | Date: October 31, 2011-November 01, 2011
Venue/Country: Arlington, U.S.A
Updated: 2011-09-07 06:38:38 (GMT+9)
Call For Papers - CFP
SafeConfig 2011: 4th Symposium on Configuration Analytics and AutomationArlington, VA, USAOctober 31 - November 1, 2011www.safeconfig.org/2011Sponsors: NIST (Technical Co-Sponsorship from IEEE and ACM is pending)Important Dates:Abstract Registration: August 29, 2011Submission: Deadline. September 19, 2011Camera Ready: October 17, 2011 Conference Dates: October 31 - November 1, 2011Configuration is a key component that determines the security, performanceand reliability of networked systems and services. A typical enterprisenetwork contains thousands of network and security appliances such asfirewalls, IPSec gateways, IDS/IPS, authentication servers, authorization,proxies, load balancer, QoS routers, virtual overlays, mobility managersetc, that must be configured uniformly considering their functional andlogical inter-dependency in order to enforce global polices andrequirements. As the current technology moves toward "smart" cyberinfrastructure and open configurable platforms (e.g., OpenFlow and virtualcloud computing), the need for configuration analytics and automationsignificantly increases. The automated and provable synthesis, refinement,validation and tuning of configurations parameters such as polices, rules,variables or interfaces are required for supporting assurable, secure andsustainable networked services.Configuration complexity places a heavy burden on both regular users andexperienced administrators and dramatically reduces overall networkassurability and usability. For example, a December 2008 report from Centerfor Strategic and International Studies "Securing Cyberspace for the 44thPresidency" states that "inappropriate or incorrect security configurationswere responsible for 80% of Air Force vulnerabilities" and a May 2008 reportfrom Juniper Networks "What is Behind Network Downtime?" states that "humanfactors [are] responsible for 50 to 80 percent of network device outages". This symposium offers a unique opportunity by bringing together researchersform academic, industry as well as government agencies to discuss thesechallenges, exchange experiences, and propose joint plans for promotingresearch and development in this area. SafeConfig Symposium program willinclude invited talks, technical presentation of peer-reviewed papers,poster/demo sessions, and joint panels on research collaboration, fundingand technology transfer opportunities. SafeConfig Symposium solicit thesubmission of original unpublished ideas in 8-page long papers, 4-page shortpapers, 2-pages posters and demos on one of the following or relateddomains/topics. Selected accepted papers will be invited for submission asbook chapters. Topics (but are not limited to)Application-specific Configuration Analysis: . Enterprise Networking forClouds and Data Centers. . Cyber-Physical Systems and IntelligentInfrastructure (e.g., Smart Grid, remote medical systems, transportation,building etc) . Mission-critical Networking (sensor-actuator, and ad hocnetworks) . Overly and Virtual and Mobile Systems Science of Configuration: . Abstract models and languages for configurationspecification . Formal semantics of security policies . Configurationcomposition and integration . Autonomic and self-configuration (auto-tuneand auto-defense) . Integration of sensor information and policyconfiguration . Theory of defense-of-depth . Configuration forsustainability . Configuration as a game . Configuration synthesis,remediation and planning . Smart Configuration . Configurationaccountability . Configuration provenance . Declarative and virtualconfigurationAnalytics: . Techniques: formal methods, statistical, interactivevisualization, reasoning, etc . Methodology: multi-level, multi-abstraction,hierarchical etc. . Integrated Analytics for security, reliability and QoSassurance. . Analytics under uncertainty . Security analytics usingheterogeneous sensors . Automated verification of system configuration andintegration . Configuration Metrics . Integrated network and hostconfiguration . Configuration testing, forensics, debugging and evaluation .Analytics of cyber attacks and terrorism . Misconfiguration (forensics) rootcause analysis . Tools and case studies . DNS, DNS-SEC, inter, intra-domainand QoS routers configuration management . Wireless, sensor and MANETconfiguration management . Servers, VMs, storage network and databaseconfiguration management . RBAC configuration managementAutomation and Optimization: . Configuration refinement and enforcement .Health-inspired and 0-configuraiton . Risk-aware and Context-awareadaptation . Machine-based configuration synthesis and enforcement . Movingtarget defense and polymorphic networks . Configuration Economics: balancinggoals and constraints . Continuous monitoring . Usability issues in securitymanagement . Automated signature and patch management . Automated alarmmanagement . Configuration management in name resolution, inter-domainrouting, and virtualized environments . Survivable complex adaptive systemOpen Interfaces, standardization and management: . SCAP-based solutions(Security Content Automation Protocol) . Configuration sharing (for cloud,agencies, companies) . Configuration provenance . Usability: human factorsand cognitive science . Abstraction and frameworks: evolutionary and cleanslate approaches . Protecting the privacy and integrity of securityconfiguration . Configuration Management case studies or user studiesSubmission GuidelinesPapers must present original work and must be written in English. We requirethat the authors use the IEEE format for papers, using one of the IEEEProceeding Templates. We solicit two types of papers, regular papers andposition papers. The length of the regular papers in the proceedings formatshould not exceed 8 US letter pages, excluding well-marked appendices.Committee members are not required to read the appendices, so papers must beintelligible without them. Short papers may not exceed 4 pages. Papers areto be submitted electronically as a single PDF file at www.edas.info.Authors of accepted papers must guarantee that their papers will bepresented at the conference.TPC Co-Chairs: Ehab Al-Shaer, UNC Charlotte Tony Sager, National Security AgencyHarigovind V Ramasamy, IBM Research General Chair: John Banghart, National Institute of Standards and Technology (NIST)Steering Committee: Ehab Al-Shaer, UNC Charlotte Krishna Kant, Intel / NSF Sanjai Narain, TelcordiaEhab Al-Shaer, PhD | Professor and Director of Cyber Defense and Network Assurability (CyberDNA)Research CenterUNC Charlotte | Dept. of Software and Information Systesm (WoodwardBuilding)9201 University City Blvd. | Charlotte, NC 28223Phone: 704-687-8663 | Fax: 704-687-6065
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.