

{"id":66,"date":"2016-05-03T23:05:21","date_gmt":"2016-05-03T21:05:21","guid":{"rendered":"http:\/\/project.inria.fr\/2016sec2\/?page_id=66"},"modified":"2016-05-26T20:50:58","modified_gmt":"2016-05-26T18:50:58","slug":"call-for-contributions","status":"publish","type":"page","link":"https:\/\/sec2-2016.inria.fr\/en\/call-for-contributions\/","title":{"rendered":"Call for Contributions"},"content":{"rendered":"<p><\/p>\n<h1>Call for Contributions<\/h1>\n<p>A session of the workshop will be dedicated to PhD students and post-docs\u00a0presenting their research topic. Candidates for this session are invited to\u00a0submit a short paper of maximum 4 pages.<\/p>\n<p>Presentation slots will last 15 minutes, questions included. To avoid any delay\u00a0between presentation slots, the slides must be transmitted in PDF format no\u00a0later than the end of the previous session.<\/p>\n<p>Accepted short papers and slides will be published on the Web site of SEC2 2016,\u00a0with their authors agreement.<\/p>\n<h1>Submission Instructions<\/h1>\n<p>Candidates for the PhD students and post-docs presentations session must\u00a0submit a short paper presenting their research topic.\u00a0The short paper must be at most 4 pages long, in A4 paper format, with at least\u00a011 pt fontsize. The short paper must be written in English.<\/p>\n<p>Short papers must be submitted using EasyChair:\u00a0<a href=\"https:\/\/easychair.org\/conferences\/?conf=sec22016\">https:\/\/easychair.org\/conferences\/?conf=sec22016<\/a><\/p>\n<p>The submission deadline figures at the <a href=\"https:\/\/sec2-2016.inria.fr\/call-for-contributions\/#dates-importantes\">bottom of this page<\/a>.<\/p>\n<h1>Topics<\/h1>\n<p>We are looking for presentations about system aspects of security in Clouds.\u00a0Topics of interest include and are not limited to:<\/p>\n<ul>\n<li>Security of new Cloud models, new virtualization architectures (e.g., edge\u00a0computing, fog computing&#8230;)<\/li>\n<li>New threats related to outsourcing and virtualization<\/li>\n<li>Vulnerabilities in hypervisors and new types of virtualization (containers,\u00a0nested virtualization, unikernels&#8230;), security by design in hypervisors<\/li>\n<li>Securing hypervisors, virtual machines, and network devices<\/li>\n<li>Introspection techniques<\/li>\n<li>Techniques for isolation and side channel mitigation<\/li>\n<li>Hardware to secure virtual infrastructures<\/li>\n<li>Advanced cryptography to secure data<\/li>\n<li>Integrity of data outsourced in Clouds<\/li>\n<li>Vulnerabilities in SDN (Software-Defined Networking) systems and\u00a0architectures<\/li>\n<li>Security monitoring in Clouds, self-adaptable protection and monitoring<\/li>\n<li>COTS (Component on the shelf) for protection and monitoring<\/li>\n<li>Collaboration between virtualization infrastructure and virtualized\u00a0infrastructure, sharing of security agents between cloud clients and\u00a0operators<\/li>\n<li>Definition, combination, and enforcement of protection and monitoring\u00a0policies<\/li>\n<li>Trade-off between security and resource usage<\/li>\n<li>Service-Level Agreement (SLA) to secure virtualized infrastructures<\/li>\n<\/ul>\n<h1 id=\"dates-importantes\">Important Dates<\/h1>\n<ul>\n<li><strong>Short paper submission deadline (hard, no further extension)<\/strong><strong>: <span style=\"color: #ff0000;\">Sunday May 29th, <\/span><\/strong><span style=\"color: #ff0000;\"><strong>2016<\/strong><\/span>.<\/li>\n<li><strong>Acceptance Notification<\/strong>\u00a0: Monday June 6th morning, 2016.<\/li>\n<li><strong>Workshop<\/strong>\u00a0: Tuesday July 5th, 2016.<\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Call for Contributions A session of the workshop will be dedicated to PhD students and post-docs\u00a0presenting their research topic. Candidates for this session are invited to\u00a0submit a short paper of maximum 4 pages. Presentation slots will last 15 minutes, questions included. To avoid any delay\u00a0between presentation slots, the slides must\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/sec2-2016.inria.fr\/en\/call-for-contributions\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":734,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-66","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/users\/734"}],"replies":[{"embeddable":true,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":12,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/66\/revisions"}],"predecessor-version":[{"id":108,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/66\/revisions\/108"}],"wp:attachment":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/media?parent=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}