From gracelq628 at 126.com Sun Nov 10 08:13:49 2019 From: gracelq628 at 126.com (Qin Liu) Date: Sun, 10 Nov 2019 10:43:49 +0800 (CST) Subject: [FM-India] =?gbk?q?Call_for_Book_Chapters=A3=BA_Security_=26_Priv?= =?gbk?q?acy_Issues_in_Fog/Edge_Computing?= Message-ID: Call for Book Chapters Book Title: Security & Privacy Issues in Fog/Edge Computing Editors Jie Wu Fellow of AAAS, and Fellow of IEEE Laura H. Carnell Professor, Department of Computer and Information Sciences Temple University, Philadelphia, USA Wei Chang Assistant Professor, Department of Computer Science Saint Joseph's University, Philadelphia, USA Introduction Recent rapid advances in Mobile Cellular Networks, Cloud Computing, and Big Data have introduced Fog/Edge Computing as an interesting topic to the research community, one that has received much attention from practitioners, scholars, and the general public. The Fog/Edge Computing can be described as an extension of the Cloud Computing to the edge of an enterprise's network to cope with the tremendous data volumes for having a low-latency or even real-time service. Considering that we are in the era of big data, many applications, such as the Internet of Things, Mobile Social Networks, and Smart City, keep generating data and interacting with the remote data centers all the time, which creates unique requirements and new challenges on the computation, storage, and communication. Thanks to the idea of the Fog/Edge Computing, certain tasks can be mitigated from the heavy-weighted data center to local devices, which not only reduces the workload of the data center but also accelerates the average serving speed. Due to the benefits of using Fog/Edge Computing, many emergent applications are now available for individuals, business enterprises, and governments. However, with the emergence of these new applications, various security and privacy issues are also exposed. Many new security and privacy techniques have been developed and are adopted in the Fog/Edge Computing. The main goal of this book is to collect the recent development of security, privacy, and applications in the Fog/Edge Computing. This book will be of particular value to academics, researchers, practitioners, government officials, business organizations (e.g., executives, marketing professionals, resource managers, etc.), and even customers -- working, participating, or those interested in fields related to Fog Computing and Cloud Computing. The content of the book will be especially useful for students in areas like Internet of Things, Clouds, Distributed Systems, Computer Networks, Data Mining, and administrative sciences and management, but also applies to students of education, economy, or law, who would benefit from the information, cases, and examples therein. Recommended Topics: This book accepts contributions from various topics in the field of Edge/Fog Computing. The tentative list of topics is as follows: 1. Information and data management in fog/edge computing 2. Access control mechanisms in fog/edge computing 3. Key management in fog/edge computing 4. Identification management and fraud management in fog/edge computing 5. Intrusion Detection in fog/edge computing 6. Secure deployment strategy of fog/edge infrastructure 7. Digital forensics and Anti-forensics techniques 8. Vulnerabilities in heterogeneous fog/edge systems 9. Cyber-physics security fog/edge devices 10.Social engineering in fog/edge computing 11.Fault tolerance for fog/edge computing 12.Reliability/scalability-based scheduling and prediction 13.Trust and reputation for fog/edge computing 14.Pricing, billing, and incentives for fog/edge computing 15.Security/privacy-related evaluation approaches for fog/edge computing 16.Privacy-preserving techniques for fog/edge services 17.Privacy protection for fog/edge users 18.Security/privacy-related fog/edge monitoring infrastructures 19.New security/privacy models, architecture, and frameworks for fog/edge computing 20.Security/privacy in fog/edge communications: 3G/4G/5G, Wi-Fi, Ad-hoc, and Wi-MAX 21.Security and privacy for IoT-related fog/edge computing paradigm 22.Security and privacy for SDN-related fog/edge computing paradigm 23.Emerging Attacks: next generation of cyber hacking for fog/edge computing Submission Procedure: Academics, researchers, practitioners, and government officials are invited to submit a chapter proposal for this edited book entitled "Security & Privacy Issues in Fog/Edge Computing" to be published in Springer. All submissions must be original and should not be under review by another publication. All submitted chapter will be peer-reviewed. The book chapters should contain 20-25 pages of content as per the Springer format. How to Submit: Submission of proposal(s)/chapter(s) via e-mail only: fogcomputingbook at gmail.com Important Dates: Proposal Submission: November 15th, 2019 Notification of Acceptance: December 15th, 2019 Full Chapter Submission: March 15th, 2020 Review results to authors: June 1st, 2020 Final chapter submission: July 1st, 2020 Inquiries: wchang at sju.edu jiewu at temple.edu -- Dr. Qin Liu College of Computer Science and Electronic Engineering Hunan University Changsha, Hunan Province,P.R. China, 410082 Mobile: +86-13548577157 Email: gracelq628 at hnu.edu.cn; gracelq628 at 126.com Homepage: http://res.hnu.edu.cn/hbs/lq/ From Andre.Etienne at lipn13.fr Tue Nov 19 19:41:41 2019 From: Andre.Etienne at lipn13.fr (=?UTF-8?B?w4l0aWVubmUgQW5kcsOp?=) Date: Tue, 19 Nov 2019 15:11:41 +0100 Subject: [FM-India] CfP: Petri Nets 2020 in Paris + special track on ACSD (ICATPN 2020, June 22-26, 2020) Message-ID: <81890a94-9f22-d31e-990b-3f2314ed9cc9@lipn13.fr> ==================================================================== ** A PDF version of this call is available at: https://lipn.univ-paris13.fr/petrinets2020/CfP-Petri-Nets-2020.pdf ** Call for Papers and Announcement Petri Nets 2020 https://lipn.univ-paris13.fr/petrinets2020/ PETRI NETS 2020 41st International Conference on Application and Theory of Petri Nets and Concurrency in Paris, France, June 22-26, 2020 Includes special track on Application of Concurrency to System Design (ACSD) Submission deadline: 15 January 2020 (abstract), 21 January 2020 (full paper) More information about the conference: http://conf-2020.petrinet.net Contact e-mail: pn2020 at petrinet.net ==================================================================== Two kinds of papers can be submitted: * Regular papers (max 20 pages) describing original results pertaining to the development of the theory of Petri Nets and distributed and concurrent systems in general, new results extending the applicability of Petri Nets, or case studies, application and experience reports pertinent to the practical use of Petri Nets and concurrency. * Tool papers (max 10 pages) describing a computer tool based on Petri Nets (not an application of the tool or the theory behind the tool). The tool should be available for use by other groups (but not necessarily for free). The submission should indicate how the reviewers can get access to the tool (this must be for free). The tool will be demonstrated in the Tool Exhibition, in addition to being presented in a conference talk. Submitted papers must: * be contributions that have not been published or submitted to other conferences/journals before or in parallel with this conference. * clearly state the problem being addressed, the goal of the work, the results achieved, and the relation to other work. * be in English and in the Springer LNCS-format: http://www.springer.de/comp/lncs/authors.html. * adhere to the page limit for the relevant category (see above). * be sent electronically (as a PDF file) using the website http://easychair.org/conferences/?conf=petrinets2020 before the deadline. The title page must: * contain a short abstract and a classification of the topics covered, preferably using the list of topics above. * clearly indicate whether the paper is submitted as a regular paper or tool paper. Submissions violating the above requirements may be immediately rejected by the PC Chairs. Important Dates: ----------------------------------------------------------- Abstract submission: January 15, 2020 Paper submission: January 21, 2020 Notification: March 6, 2020 Final Version Due: March 20, 2020 Workshops & Tutorials: June 22-23, 2020 Main Conferences: June 24-26, 2020 Best papers accepted for the conference will be invited as submissions to a special issue of the Fundamenta Informaticae journal. General topics related to concurrency - Model checking and verification of distributed systems - Verification of infinite-state or parametric systems - Causality/partial order theory of concurrency - Educational issues related to concurrency - New issues and developments in the theory of concurrency - Modelling of hardware and biological systems Topics specific to Petri nets - Analysis and synthesis, structure and behaviour of nets - System design and model-driven development using nets - Relationships between Petri Nets and other approaches - Net-based semantical, logical and algebraic calculi - Higher-level net models (coloured nets, timed nets, etc.) - Stochastic net models - Verification and model checking using nets - Process discovery and conformance checking - Computer tools for nets - Standardisation of nets - Computer tools for nets - Experience reports describing applications of nets to different kinds of systems and application fields, e.g.:     flexible manufacturing systems, real-time systems, embedded systems, biological systems, health and medical systems, environmental systems, hardware, telecommunications, railway networks, components based development, office automation, workflows, process mining, supervisory control, protocols and networks, Internet and web services, e-commerce and trading, programming languages, performance evaluation, operations research. Special track on ACSD (Application of Concurrency to System Design) - Both theoretical and applied research about formal approaches (in a broad sense) to designing computer systems that exhibit concurrent behaviour. The formal models of computation and concurrency for the above systems and problems are not limited by Petri nets, but also include models like dataflow models, communicating automata, process algebras, graph rewriting systems, state charts, MSCs, modal and temporal logics. ==================================================================== Tool Exhibition: The tools presented in the accepted tool papers will be demonstrated in the Tool Exhibition, in addition to being presented in a conference talk. In case of any comments or questions, please contact the organisers:   via email: pn2020 at petrinet.net   via http://conf-2020.petrinet.net General Chairs:  Laure Petrucci and Étienne André (LIPN, CNRS, Université Paris 13, France) PC-Chairs:  Ryszard Janicki (McMaster University, Canada)  Natalia Sidorova (Technische Universiteit Eindhoven, The Netherlands)  Thomas Chatain - ACSD track (LSV, ENS Paris-Saclay, France) From Andre.Etienne at lipn13.fr Mon Nov 25 20:25:37 2019 From: Andre.Etienne at lipn13.fr (=?UTF-8?B?w4l0aWVubmUgQW5kcsOp?=) Date: Mon, 25 Nov 2019 15:55:37 +0100 Subject: [FM-India] PNSE 2020: call for papers (part of Petri Nets 2020 in Paris) Message-ID: Call for Papers and Announcement International Workshop on Petri Nets and Software Engineering PNSE’20, Paris, France, June 22-23, 2020    http://www.informatik.uni-logi.de/TGI/events/pnse/        PNSE’20 is a satellite event of PETRI NETS’20 https://lipn.univ-paris13.fr/petrinets2020/                                   Scope For the successful realisation of complex systems of interacting and reactive software and hardware components the use of a precise language at different stages of the development process is of crucial importance. Petri nets are becoming increasingly popular in this area, as they provide a uniform language supporting the tasks of modelling, validation, and verification. We welcome contributions describing original research in topics related to Petri nets in combination with software engineering, addressing open problems or presenting new ideas regarding the relation of Petri nets and software engineering. Furthermore, we look for surveys addressing open problems and new applications of Petri nets and for Petri nets.                             Important Dates: Submission of Abstracts (optional):March9th,2020 Deadline for submission of papers:March16th,2020 Deadline for submission of posters:April24th,2020 Notification of paper acceptance:April20th,2020 Notification of poster acceptance:April27th,2020 Deadline for final revisions:April30th,2020                                   Topics Topics of interest include but are not limited to: Software Engineering   agile development   product lines   software in business contexts   software development and production environments; DevOps; IDEs; continuous integration   programming and concurrency   technologies: hadoop / MapReduce; akka, Spark; Flink; STORM etc.   distributed database technology: redis; cassandra; CouchDB; mongoDB etc.   concepts for mobility, concurrency, non-determinism, distribution, embedding, flexibility   social concepts for norms, rules, contracts, communication, co-ordination, co-operation   software engineering addressing Petri nets, UML techniques, BPMN, BPEL, eEPCs, CMMN and other modelling techniques Modelling   representation of formal models by intuitive modelling concepts   guidelines for the construction of system models   representative examples   process-, service-, state-, event-, component-, organisation-, object-, agent- and actor-oriented approaches   adaption, integration, and enhancement of concepts from other disciplines   views and abstractions of systems   meta-modelling and domain specific languages (DSLs)   model-driven architecture   modelling software landscapes   web service-based software development Validation and Execution   prototyping   simulation, observation, animation   code generation and execution   testing and debugging   efficient implementation Verification   structural methods (e.g. place invariants, reduction rules)   results for structural subclasses of nets   relations between structure and behaviour   state space based approaches   efficient model checking   assertional and deductive methods (e.g. temporal logics)   process algebraic methods   model and graph transformation   applications of category theory, rewriting logic and linear logic Application of Petri nets and Software Engineering, in particular in the domains of …   education, training and teaching at any level,   flexible manufacturing,   logistics,   telecommunication,   big data,   cyber-physical systems,   internet-of-things,   grid and cloud computing,   distributed systems,   workflow management and   embedded systems. Tools in the fields mentioned above                              Submissions The program committee invites submissions of full contributions (15 up to 20 pages) or short contributions (5 up to 8 pages). Ongoing work (up to 2 pages) can also be presented in a special poster session. Papers should be submitted in electronic form (PDF) using the Springer LNCS-format (see http://www.springer.de/comp/lncs/authors.html).  Submissions should include title, authors' addresses, E-mail addresses, keywords and an abstract. For your submission in PDF format please use the online conference management system at https://easychair.org/conferences/?conf=pnse20 The papers will be peer reviewed by at least three members of the PC. Accepted contributions will be included in the workshop proceedings, which will be available at the workshop and published online. The best papers from the workshop will be invited for publication in a volume of the journal sub-line of Lecture Notes in Computer Science entitled "Transactions on Petri Nets and Other Models of Concurrency" (ToPNoC). The papers are expected to be thoroughly revised and they will go through a totally new round of reviewing as is standard practice for journal papers. PC Chairs Ekkart Kindler, Technical University of Denmark, Denmark Michael Köhler-Bußmeier, University of Applied Science Hamburg, Germany Heiko Rölke, FH Graubünden, Austria In case of any problems please contact us by email at pnse20 at easychair.org ---- [[ Petri Nets World: ]] [[ http://www.informatik.uni-hamburg.de/TGI/PetriNets/ ]] [[ Mailing list FAQ: ]] [[ http://www.informatik.uni-hamburg.de/TGI/PetriNets/pnml/faq.html ]] [[ Post messages/summary of replies: ]] [[ petrinet at informatik.uni-hamburg.de ]] From gracelq628 at 126.com Wed Nov 27 10:38:46 2019 From: gracelq628 at 126.com (Qin Liu) Date: Wed, 27 Nov 2019 13:08:46 +0800 (CST) Subject: [FM-India] Call for Book Chapters: Security & Privacy Issues in Fog/Edge Computing Message-ID: <4311648a.3a05.16eab43035f.Coremail.gracelq628@126.com> Call for Book Chapters Book Title: Security & Privacy Issues in Fog/Edge Computing Editors Jie Wu Fellow of AAAS, and Fellow of IEEE Laura H. Carnell Professor, Department of Computer and Information Sciences Temple University, Philadelphia, USA Wei Chang Assistant Professor, Department of Computer Science Saint Joseph's University, Philadelphia, USA Introduction Recent rapid advances in Mobile Cellular Networks, Cloud Computing, and Big Data have introduced Fog/Edge Computing as an interesting topic to the research community, one that has received much attention from practitioners, scholars, and the general public. The Fog/Edge Computing can be described as an extension of the Cloud Computing to the edge of an enterprise's network to cope with the tremendous data volumes for having a low-latency or even real-time service. Considering that we are in the era of big data, many applications, such as the Internet of Things, Mobile Social Networks, and Smart City, keep generating data and interacting with the remote data centers all the time, which creates unique requirements and new challenges on the computation, storage, and communication. Thanks to the idea of the Fog/Edge Computing, certain tasks can be mitigated from the heavy-weighted data center to local devices, which not only reduces the workload of the data center but also accelerates the average serving speed. Due to the benefits of using Fog/Edge Computing, many emergent applications are now available for individuals, business enterprises, and governments. However, with the emergence of these new applications, various security and privacy issues are also exposed. Many new security and privacy techniques have been developed and are adopted in the Fog/Edge Computing. The main goal of this book is to collect the recent development of security, privacy, and applications in the Fog/Edge Computing. This book will be of particular value to academics, researchers, practitioners, government officials, business organizations (e.g., executives, marketing professionals, resource managers, etc.), and even customers -- working, participating, or those interested in fields related to Fog Computing and Cloud Computing. The content of the book will be especially useful for students in areas like Internet of Things, Clouds, Distributed Systems, Computer Networks, Data Mining, and administrative sciences and management, but also applies to students of education, economy, or law, who would benefit from the information, cases, and examples therein. Recommended Topics: This book accepts contributions from various topics in the field of Edge/Fog Computing. The tentative list of topics is as follows: 1.Information and data management in fog/edge computing 2.Access control mechanisms in fog/edge computing 3.Key management in fog/edge computing 4.Identification management and fraud management in fog/edge computing 5.Intrusion Detection in fog/edge computing 6.Secure deployment strategy of fog/edge infrastructure 7.Digital forensics and Anti-forensics techniques 8.Vulnerabilities in heterogeneous fog/edge systems 9.Cyber-physics security fog/edge devices 10.Social engineering in fog/edge computing 11.Fault tolerance for fog/edge computing 12.Reliability/scalability-based scheduling and prediction 13.Trust and reputation for fog/edge computing 14.Pricing, billing, and incentives for fog/edge computing 15.Security/privacy-related evaluation approaches for fog/edge computing 16.Privacy-preserving techniques for fog/edge services 17.Privacy protection for fog/edge users 18.Security/privacy-related fog/edge monitoring infrastructures 19.New security/privacy models, architecture, and frameworks for fog/edge computing 20.Security/privacy in fog/edge communications: 3G/4G/5G, Wi-Fi, Ad-hoc, and Wi-MAX 21.Security and privacy for IoT-related fog/edge computing paradigm 22.Security and privacy for SDN-related fog/edge computing paradigm 23.Emerging Attacks: next generation of cyber hacking for fog/edge computing Submission Procedure: Academics, researchers, practitioners, and government officials are invited to submit a chapter proposal for this edited book entitled "Security & Privacy Issues in Fog/Edge Computing" to be published in Springer. All submissions must be original and should not be under review by another publication. All submitted chapter will be peer-reviewed. The book chapters should contain 20-25 pages of content as per the Springer format. How to Submit: Submission of proposal(s)/chapter(s) via e-mail only: fogcomputingbook at gmail.com Important Dates: Proposal Submission: November 15th, 2019 November 30th, 2019 (extended) Notification of Acceptance: December 15th, 2019 Full Chapter Submission: March 15th, 2020 Review results to authors: June 1st, 2020 Final chapter submission: July 1st, 2020 Inquiries: wchang at sju.edu jiewu at temple.edu -- Dr. Qin Liu College of Computer Science and Electronic Engineering Hunan University Changsha, Hunan Province,P.R. China, 410082 Mobile: +86-13548577157 Email: gracelq628 at hnu.edu.cn; gracelq628 at 126.com Homepage: http://res.hnu.edu.cn/hbs/lq/