3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft)

2 July 2021 // Tokyo, Japan

ASTRID Project Logo CYBER-TRUST Project Logo GUARD Logo SIMARGL Logo DATAVAULTS Logo RAINBOW Logo PALANTIR Logo SPEAR Project Logo

Download the Call for Papers as PDF  , as TXT .

Call for Papers

Evolving business models are progressively reshaping ICT services and infrastructures, with a growing "softwarization" trend, the massive introduction of virtualization paradigms, and the tight integration with the physical environment. Agile, ubiquitous, pervasive, and programmable networking infrastructures are now leveraging new computation models, where the dynamic and data-driven composition of services disregards the traditional physical and administrative boundaries. Unfortunately, the evolution of cyber-security paradigms has not followed with the same pace, leading to a substantial gap in solutions capable of protecting the new forms of distributed and heterogeneous systems against an evolving landscape of cyber-threats. This is especially worrying considering that part of this overwhelming technological evolution is already encompassing critical infrastructures and industrial systems, such as smart grid components, connected cars and other merging applications within the IoT.

The predominant interspersion of lonely valuable resources with unsafe computing and communication infrastructures makes the application of security perimeter model ineffective. The traditional security tools that organizations have long relied on to protect their networks (i.e., antivirus, intrusion prevention systems, firewalls) are no longer capable of providing sufficient security guarantees against the rapid escalation of advanced persistent threats and multi-vector attacks. The growing complexity of cyber-attacks are urgently demanding more correlation in space and time of (apparently) independent events and logs, and a a higher degree of coordination among different security mechanisms.

The SecSoft workshop aims to gather together novel approaches for providing organizations the appropriate situational awareness in relation to cyber security threats allowing them to quickly detect and effectively respond to sophisticated cyber-attacks. The specific target is complementary research works on complementary cyber-security aspects for virtualized and software-defined infrastructures, including but not limited to:

Multi-disciplinary and collaborative research projects are encouraged to submit joint papers describing their integrated architectures and cyber-security platforms, with special emphasis on how they address the challenging cyber-security requirements of softwarized environments and critical infrastructures.

Interested authors are invited to submit papers according to the following guidelines:

For more details about submission form and procedure, please check the NetSoft conference website.

Important dates:

Note:

The Best Paper finalists will be invited for submission of an extended paper for peer review and potential publication in a Special Issue of IEEE Transactions on Network and Service Management.

Submission Link:

Papers must be submitted by EDAS. Click here to submit now.

Please check NetSoft's Publication and No-Show Policy before submitting.