Time (GMT+1) | Program | Room Aragonese | Room Normanna |
---|---|---|---|
8.00 - 9.15 | Registration | ||
9.15 - 9.30 | Welcome | X | |
9.30 - 10.30 | Paper Session | TRACK CLOUD INFRASTRUCTURE, OPERATION AND MANAGEMENT - B1 | TRACK CLOUD SERVICES AND APPLICATIONS - A1 |
10.30 - 11.00 | Coffee Break | ||
11.00 - 12.30 | Paper Session | TRACK CLOUD INFRASTRUCTURE, OPERATION AND MANAGEMENT - B2 | TRACK EDGE COMPUTING, IOT AND DISTRIBUTED CLOUD - C1 |
12.30 - 14.00 | Lunch break | ||
14.00 - 15.30 | Paper Session | TRACK CLOUD INFRASTRUCTURE, OPERATION AND MANAGEMENT - B3 | TRACK EDGE COMPUTING, IOT AND DISTRIBUTED CLOUD - C2 |
15.30 - 15.50 | Coffee Break | ||
15.50 - 17.20 | Tutorial | X |
Time (GMT+1) | Program | Room Aragonese | Room Normanna |
---|---|---|---|
9.30 - 10.30 | Keynote | X | |
10.30 - 11.00 | Coffee Break | ||
11.00 - 12.30 | Paper session | TRACK CLOUD INFRASTRUCTURE, OPERATION AND MANAGEMENT - B4 | TRACK SECURITY, PRIVACY AND TRUST - D1 |
12.30 - 14.00 | Lunch break | ||
14.00 - 15.30 | Paper session | TRACK CLOUD SERVICES AND APPLICATIONS - A3 | TRACK SECURITY, PRIVACY AND TRUST - D2 |
15.30 - 15.50 | Coffee Break | ||
15.50 - 17.20 | Paper session | WORKSHOP OPEN INFRASTRUCTURE AS CODE - W1 | TRACK CLOUD SERVICES AND APPLICATIONS - A2 |
19.30 | Social Dinner |
Time (GMT+1) | Program | Room Aragonese | Room Normanna |
---|---|---|---|
9.00 - 10.30 | Paper Session | SCC 2023 : INTERNATIONAL WORKSHOP ON SECURE CLOUD CONTINUUM - W2 | TRACK SECURITY, PRIVACY AND TRUST - D3 |
10.30 - 11.00 | Coffee Break | ||
11.00 - 12.30 | Paper Session | SCC 2023 : INTERNATIONAL WORKSHOP ON SECURE CLOUD CONTINUUM - W2 | |
12.30 - 14.00 | Lunch break | ||
14.00 - 15.30 | Paper Session | SCC 2023 : INTERNATIONAL WORKSHOP ON SECURE CLOUD CONTINUUM - W2 |
Time (GMT+1) | Program | Room Aragonese | Room Normanna |
---|---|---|---|
8.00 - 9.15 | Registration | ||
9.15 - 9.30 | Welcome | X | |
9.30 - 10.30 | Paper Session | Bridging the Chasm Between Ideal and Realistic Federated Learning: A Measurements Study | Depot: Dependency-Eager Platform of Transformations |
Experimental analysis of microservices architectures for hosting cloud-based Massive Multiplayer Online Role-Playing Game (MMORPG) | |||
10.30 - 11.00 | Coffee Break | ||
11.00 - 12.30 | Paper Session | Introducing TinyKVM for High-Performance CDN Edge Services | |
A Lightweight Routing Layer Using a Reliable Link-Layer Protocol | Energy-Aware Streaming Analytics Job Scheduling for Edge Computing | ||
MScheduler: Leveraging Spot Instances for High-Performance Reservoir Simulation in the Cloud | Energy-Efficient Offloading in Edge Slicing with Non-Linear Power Functions | ||
12.30 - 14.00 | Lunch break | ||
14.00 - 15.30 | Paper Session | Can Software Containerisation Fit The Car On-Board Systems ? | A Load Balancing Algorithm For Long-Life Green Edge Systems |
Enhanced Runtime-Adaptable Routing for Serverless Functions based on Performance and Cost Tradeoffs in Hybrid Cloud Settings | Peer-to-Peer Approach for Edge Computing Services | ||
PuppetStack: A tool for deploying high-availability private cloud infrastructure | Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection | ||
15.30 - 15.50 | Coffee Break | ||
15.50 - 17.20 | Tutorial | X |
Time (GMT+1) | Program | Room Aragonese | Room Normanna |
---|---|---|---|
9.30 - 10.30 | Keynote | X | |
10.30 - 11.00 | Coffee Break | ||
11.00 - 12.30 | Paper session | HCoop: A Cooperative and Hybrid Resource Scheduling for Heterogeneous Jobs in Clouds | A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures |
OSµS: An Open-Source Microservice Prototyping Platform | Lightweight Cloud Application Sandboxing | ||
Inverse Response Time Ratio Scheduler: Optimizing Throughput and Response Time for Serverless Computing | Triad: Trusted Timestamps in Untrusted Environments | ||
12.30 - 14.00 | Lunch break | ||
14.00 - 15.30 | Paper session | Performance analysis of the Raft consensus algorithm on Hyperledger Fabric and Ethereum on cloud | The Flaw Within: Identifying CVSS Score Discrepancies in the NVD |
Enabling 5G QoS configuration capabilities for IoT applications on container orchestration platform | Decentralised Authentication in Microservice Architectures with SSI and DID in Blockchain | ||
Cost-optimized scheduling for Microservices in Kubernetes | Enabling Trusted TEE-as-a-Service Models with Privacy Preserving Automatons | ||
15.30 - 15.50 | Coffee Break | ||
15.50 - 17.20 | Paper session | Increasing Robustness of Blockchain Peer-to-Peer Networks with Alternative Peer Initialization | CloudScent: a model for code smell analysis in open-source cloud |
Decoding NFT Market Dynamics with Data | Recommendation engine for optimal Spark delta tables partitioning | ||
Flexible and Secure Code Deployment in Federated Learning using Large Language Models: Prompt Engineering to Enhance Malicious Code Detection | Undoing CRDT Operations Automatically | ||
Addressing Serverless Computing Vendor Lock-In through Cloud Service Abstraction | |||
19.30 | Social Dinner |
Time (GMT+1) | Program | Room Aragonese | Room Normanna |
---|---|---|---|
9.00 - 10.30 | Paper Session | Welcome from Workshop chair Workshop Keynote - Toward the deployment of Secure IoT Systems over the Cloud Continuum |
Enhancing Mobile Privacy and Security: A Face Skin Patch-Based Anti-Spoofing Approach |
A Blockchain-based Online Trading Platform: TrustTrade | |||
An Evaluation of Transformer Models for Early Intrusion Detection | Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study | ||
10.30 - 11.00 | Coffee Break | ||
11.00 - 12.30 | Paper Session | Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions | SAGE - A Tool for Optimal Deployments in Kubernetes Clusters |
Testing techniques to assess impact and cascading effects | GSLAC: GPU Software Level Access Control for Information Isolation on Cloud Platforms | ||
Towards trustworthy AI: Security risk assessment methodology for Artificial Intelligence systems | |||
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT | |||
12.30 - 14.00 | Lunch break | ||
14.00 - 15.30 | Paper Session | Design and Implementation of Web3-Based E-Commerce Cryptocurrency Payment System | |
Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends | |||
Detecting Security Requirements in GitHub Issues | |||
Software Bill of Materials in Critical Infrastructure |