CIFS“19届研讨会主席”的欢迎及组织

Josef Spillner, Manar AbuTalib, Q. Nasir, Farhad Khalilnia
{"title":"CIFS“19届研讨会主席”的欢迎及组织","authors":"Josef Spillner, Manar AbuTalib, Q. Nasir, Farhad Khalilnia","doi":"10.1145/3368235.3368885","DOIUrl":null,"url":null,"abstract":"It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland! The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries. In many scenarios, sensors or actors are connected to on-site compute units and fog systems which themselves are connected to clouds. The transmission, processing and storage of information needs to be secured across the entire chain or network, using diverse mechanisms often outside the control of the application developer. This workshop aims to discuss recent advances around holistic security aspects involving availability, integrity, confidentiality, non-repudiability and other guaranteeable properties. With six peer-reviewed research papers and one impulse talk, this workshop combines the most pressing topics on the intersection between distributed systems and (cyber-)security aspects. Two papers investigate the use of blockchains: «Intelligent Price Alert System for Blockchain-based Digital Assets» and «Blockchain as a Trusted Component in Cloud SLA Verification». Intrusion detection and avoidance is the suject of three papers: «MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices», «An Algorithm to Prevent Unauthorised Data Modification using Collaborative Nodes» and «Techniques for Mutual Auditability in a Cloud Environment». Finally, algorithmic aspects of data encoding are covered in «Concurrent Failure Recovery for MSR Regenerating Code via Product Matrix Construction». These papers represent authors from six countries over four continents, and thus a significant glimpse into emerging research around the world. With an impulse talk «Novel Applications of Stealth Computing», the workshop also conveys recent research efforts on holistic combinations of data encoding, dispersal and processing for industrially relevant systems combining connected devices and continuum services from fogs to clouds.","PeriodicalId":166357,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"CIFS'19 Workshop Chairs' Welcome & Organization\",\"authors\":\"Josef Spillner, Manar AbuTalib, Q. Nasir, Farhad Khalilnia\",\"doi\":\"10.1145/3368235.3368885\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland! The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries. In many scenarios, sensors or actors are connected to on-site compute units and fog systems which themselves are connected to clouds. The transmission, processing and storage of information needs to be secured across the entire chain or network, using diverse mechanisms often outside the control of the application developer. This workshop aims to discuss recent advances around holistic security aspects involving availability, integrity, confidentiality, non-repudiability and other guaranteeable properties. With six peer-reviewed research papers and one impulse talk, this workshop combines the most pressing topics on the intersection between distributed systems and (cyber-)security aspects. Two papers investigate the use of blockchains: «Intelligent Price Alert System for Blockchain-based Digital Assets» and «Blockchain as a Trusted Component in Cloud SLA Verification». Intrusion detection and avoidance is the suject of three papers: «MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices», «An Algorithm to Prevent Unauthorised Data Modification using Collaborative Nodes» and «Techniques for Mutual Auditability in a Cloud Environment». Finally, algorithmic aspects of data encoding are covered in «Concurrent Failure Recovery for MSR Regenerating Code via Product Matrix Construction». These papers represent authors from six countries over four continents, and thus a significant glimpse into emerging research around the world. With an impulse talk «Novel Applications of Stealth Computing», the workshop also conveys recent research efforts on holistic combinations of data encoding, dispersal and processing for industrially relevant systems combining connected devices and continuum services from fogs to clouds.\",\"PeriodicalId\":166357,\"journal\":{\"name\":\"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion\",\"volume\":\"115 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3368235.3368885\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3368235.3368885","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

我们非常高兴地欢迎您参加首届云、物联网和雾安全国际研讨会- CIFS 2019,并与第十二届IEEE/ACM公用事业和云计算国际会议- UCC 2019同期举行。欢迎来到奥克兰!敏感信息的处理是一个不受假想系统边界影响的跨领域课题。在许多情况下,传感器或参与者连接到现场计算单元和雾系统,而雾系统本身连接到云。信息的传输、处理和存储需要在整个链或网络中得到保护,使用不同的机制,通常不受应用程序开发人员的控制。本次研讨会旨在讨论整体安全方面的最新进展,包括可用性、完整性、保密性、不可抵赖性和其他可保证属性。六篇同行评审的研究论文和一篇冲动演讲,本次研讨会结合了分布式系统和(网络)安全方面的交叉点上最紧迫的主题。两篇论文研究了区块链的使用:《基于区块链的数字资产的智能价格警报系统》和《区块链作为云SLA验证中的可信组件》。入侵检测和避免是三篇论文的主题:“MEML:用于物联网边缘设备网络攻击检测的基于资源感知mqtt的机器学习”,“使用协作节点防止未经授权数据修改的算法”和“云环境中相互审计的技术”。最后,数据编码的算法方面将在«通过产品矩阵构建MSR再生代码的并发故障恢复»中介绍。这些论文代表了来自四大洲六个国家的作者,因此是对世界各地新兴研究的重要一瞥。在题为“隐形计算的新应用”的演讲中,研讨会还传达了最近的研究成果,即数据编码、分散和处理的整体组合,用于工业相关系统,结合连接设备和从雾到云的连续服务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
CIFS'19 Workshop Chairs' Welcome & Organization
It is our great pleasure to welcome you to the first International Workshop on Cloud, IoT and Fog Security - CIFS 2019 collocated with the 12th IEEE/ACM International Conference on Utility and Cloud Computing - UCC 2019. Welcome to Auckland! The processing of sensitive information is a cross-cutting topic unimpressed by imaginary system boundaries. In many scenarios, sensors or actors are connected to on-site compute units and fog systems which themselves are connected to clouds. The transmission, processing and storage of information needs to be secured across the entire chain or network, using diverse mechanisms often outside the control of the application developer. This workshop aims to discuss recent advances around holistic security aspects involving availability, integrity, confidentiality, non-repudiability and other guaranteeable properties. With six peer-reviewed research papers and one impulse talk, this workshop combines the most pressing topics on the intersection between distributed systems and (cyber-)security aspects. Two papers investigate the use of blockchains: «Intelligent Price Alert System for Blockchain-based Digital Assets» and «Blockchain as a Trusted Component in Cloud SLA Verification». Intrusion detection and avoidance is the suject of three papers: «MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices», «An Algorithm to Prevent Unauthorised Data Modification using Collaborative Nodes» and «Techniques for Mutual Auditability in a Cloud Environment». Finally, algorithmic aspects of data encoding are covered in «Concurrent Failure Recovery for MSR Regenerating Code via Product Matrix Construction». These papers represent authors from six countries over four continents, and thus a significant glimpse into emerging research around the world. With an impulse talk «Novel Applications of Stealth Computing», the workshop also conveys recent research efforts on holistic combinations of data encoding, dispersal and processing for industrially relevant systems combining connected devices and continuum services from fogs to clouds.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Applicability of Serverless Computing in Fog Computing Environments for IoT Scenarios Toward Stock Price Prediction using Deep Learning Concurrent Failure Recovery for MSR Regenerating Code via Product Matrix Construction Blockchain as a Trusted Component in Cloud SLA Verification Héctor: A Framework for Testing IoT Applications Across Heterogeneous Edge and Cloud Testbeds
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1