| Time (GMT+1) | Program | Room Aragonese | Room Normanna |
|---|---|---|---|
| 8.00 - 9.15 | Registration | ||
| 9.15 - 9.30 | Welcome | X | |
| 9.30 - 10.30 | Paper Session | TRACK CLOUD INFRASTRUCTURE, OPERATION AND MANAGEMENT - B1 | TRACK CLOUD SERVICES AND APPLICATIONS - A1 |
| 10.30 - 11.00 | Coffee Break | ||
| 11.00 - 12.30 | Paper Session | TRACK CLOUD INFRASTRUCTURE, OPERATION AND MANAGEMENT - B2 | TRACK EDGE COMPUTING, IOT AND DISTRIBUTED CLOUD - C1 |
| 12.30 - 14.00 | Lunch break | ||
| 14.00 - 15.30 | Paper Session | TRACK CLOUD INFRASTRUCTURE, OPERATION AND MANAGEMENT - B3 | TRACK EDGE COMPUTING, IOT AND DISTRIBUTED CLOUD - C2 |
| 15.30 - 15.50 | Coffee Break | ||
| 15.50 - 17.20 | Tutorial | X | |
| Time (GMT+1) | Program | Room Aragonese | Room Normanna |
|---|---|---|---|
| 9.30 - 10.30 | Keynote | X | |
| 10.30 - 11.00 | Coffee Break | ||
| 11.00 - 12.30 | Paper session | TRACK CLOUD INFRASTRUCTURE, OPERATION AND MANAGEMENT - B4 | TRACK SECURITY, PRIVACY AND TRUST - D1 |
| 12.30 - 14.00 | Lunch break | ||
| 14.00 - 15.30 | Paper session | TRACK CLOUD SERVICES AND APPLICATIONS - A3 | TRACK SECURITY, PRIVACY AND TRUST - D2 |
| 15.30 - 15.50 | Coffee Break | ||
| 15.50 - 17.20 | Paper session | WORKSHOP OPEN INFRASTRUCTURE AS CODE - W1 | TRACK CLOUD SERVICES AND APPLICATIONS - A2 |
| 19.30 | Social Dinner | ||
| Time (GMT+1) | Program | Room Aragonese | Room Normanna |
|---|---|---|---|
| 9.00 - 10.30 | Paper Session | SCC 2023 : INTERNATIONAL WORKSHOP ON SECURE CLOUD CONTINUUM - W2 | TRACK SECURITY, PRIVACY AND TRUST - D3 |
| 10.30 - 11.00 | Coffee Break | ||
| 11.00 - 12.30 | Paper Session | SCC 2023 : INTERNATIONAL WORKSHOP ON SECURE CLOUD CONTINUUM - W2 | |
| 12.30 - 14.00 | Lunch break | ||
| 14.00 - 15.30 | Paper Session | SCC 2023 : INTERNATIONAL WORKSHOP ON SECURE CLOUD CONTINUUM - W2 | |
| Time (GMT+1) | Program | Room Aragonese | Room Normanna |
|---|---|---|---|
| 8.00 - 9.15 | Registration | ||
| 9.15 - 9.30 | Welcome | X | |
| 9.30 - 10.30 | Paper Session | Bridging the Chasm Between Ideal and Realistic Federated Learning: A Measurements Study | Depot: Dependency-Eager Platform of Transformations |
| Experimental analysis of microservices architectures for hosting cloud-based Massive Multiplayer Online Role-Playing Game (MMORPG) | |||
| 10.30 - 11.00 | Coffee Break | ||
| 11.00 - 12.30 | Paper Session | Introducing TinyKVM for High-Performance CDN Edge Services | |
| A Lightweight Routing Layer Using a Reliable Link-Layer Protocol | Energy-Aware Streaming Analytics Job Scheduling for Edge Computing | ||
| MScheduler: Leveraging Spot Instances for High-Performance Reservoir Simulation in the Cloud | Energy-Efficient Offloading in Edge Slicing with Non-Linear Power Functions | ||
| 12.30 - 14.00 | Lunch break | ||
| 14.00 - 15.30 | Paper Session | Can Software Containerisation Fit The Car On-Board Systems ? | A Load Balancing Algorithm For Long-Life Green Edge Systems |
| Enhanced Runtime-Adaptable Routing for Serverless Functions based on Performance and Cost Tradeoffs in Hybrid Cloud Settings | Peer-to-Peer Approach for Edge Computing Services | ||
| PuppetStack: A tool for deploying high-availability private cloud infrastructure | Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection | ||
| 15.30 - 15.50 | Coffee Break | ||
| 15.50 - 17.20 | Tutorial | X | |
| Time (GMT+1) | Program | Room Aragonese | Room Normanna |
|---|---|---|---|
| 9.30 - 10.30 | Keynote | X | |
| 10.30 - 11.00 | Coffee Break | ||
| 11.00 - 12.30 | Paper session | HCoop: A Cooperative and Hybrid Resource Scheduling for Heterogeneous Jobs in Clouds | A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures |
| OSµS: An Open-Source Microservice Prototyping Platform | Lightweight Cloud Application Sandboxing | ||
| Inverse Response Time Ratio Scheduler: Optimizing Throughput and Response Time for Serverless Computing | Triad: Trusted Timestamps in Untrusted Environments | ||
| 12.30 - 14.00 | Lunch break | ||
| 14.00 - 15.30 | Paper session | Performance analysis of the Raft consensus algorithm on Hyperledger Fabric and Ethereum on cloud | The Flaw Within: Identifying CVSS Score Discrepancies in the NVD |
| Enabling 5G QoS configuration capabilities for IoT applications on container orchestration platform | Decentralised Authentication in Microservice Architectures with SSI and DID in Blockchain | ||
| Cost-optimized scheduling for Microservices in Kubernetes | Enabling Trusted TEE-as-a-Service Models with Privacy Preserving Automatons | ||
| 15.30 - 15.50 | Coffee Break | ||
| 15.50 - 17.20 | Paper session | Increasing Robustness of Blockchain Peer-to-Peer Networks with Alternative Peer Initialization | CloudScent: a model for code smell analysis in open-source cloud |
| Decoding NFT Market Dynamics with Data | Recommendation engine for optimal Spark delta tables partitioning | ||
| Flexible and Secure Code Deployment in Federated Learning using Large Language Models: Prompt Engineering to Enhance Malicious Code Detection | Undoing CRDT Operations Automatically | ||
| Addressing Serverless Computing Vendor Lock-In through Cloud Service Abstraction | |||
| 19.30 | Social Dinner | ||
| Time (GMT+1) | Program | Room Aragonese | Room Normanna |
|---|---|---|---|
| 9.00 - 10.30 | Paper Session | Welcome from Workshop chair Workshop Keynote - Toward the deployment of Secure IoT Systems over the Cloud Continuum |
Enhancing Mobile Privacy and Security: A Face Skin Patch-Based Anti-Spoofing Approach |
| A Blockchain-based Online Trading Platform: TrustTrade | |||
| An Evaluation of Transformer Models for Early Intrusion Detection | Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study | ||
| 10.30 - 11.00 | Coffee Break | ||
| 11.00 - 12.30 | Paper Session | Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions | SAGE - A Tool for Optimal Deployments in Kubernetes Clusters |
| Testing techniques to assess impact and cascading effects | GSLAC: GPU Software Level Access Control for Information Isolation on Cloud Platforms | ||
| Towards trustworthy AI: Security risk assessment methodology for Artificial Intelligence systems | |||
| Towards Smarter Security Orchestration and Automatic Response for CPS and IoT | |||
| 12.30 - 14.00 | Lunch break | ||
| 14.00 - 15.30 | Paper Session | Design and Implementation of Web3-Based E-Commerce Cryptocurrency Payment System | |
| Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends | |||
| Detecting Security Requirements in GitHub Issues | |||
| Software Bill of Materials in Critical Infrastructure | |||