7th SETOP International Workshop on Autonomous and Spontaneous Security
                  11th September 2014, Wroclaw, Poland
                         http://www.setop.info

Scope: 

Autonomous and Spontaneous security focuses on the dynamics of system
behaviour in response to threats, their detection, characterisation,
diagnosis and mitigation in particular through architectural and
behavioural reconfiguration. Such approaches are needed in Embedded
Systems, Pervasive Computing, and Cloud environments, which bridge the
physical, social, and computing worlds and challenge traditional
security provisions from different perspectives. Systems must be agile
and continue to operate in the presence of compromise, introspective
and self-protecting rather than just hardened, resilient to more
complex threats yet more vulnerable as they are physically accessible,
widely heterogeneous and need to integrate long-term legacy
components.

Ensuring their resilience and protecting such systems at scale
requires novel solutions across a broad spectrum of computational and
resource environments, that integrate techniques from different areas
including security, network management, machine learning, knowledge
representation, control theory, stochastic analysis and software
engineering amongst others.

SETOP invites submissions of novel research results and practical
experiences relevant to autonomous and spontaneous security approaches
including but not limited to the list below.  We are looking for
contributions to both technologies application areas.

Examples for Relevant Application areas:  
 o  Cloud Environments
 o  Critical Infrastructures
 o  Vehicular Networks
 o  Mobile Computing
 o  Mobile Ad-Hoc Networks	
 o  Wireless Sensor Networks
 o  Personal Area Networks
 o  Internet of Things

Examples of Relevant Technologies / Methodologies:
 o  Intrusion and Compromise detection and characterisation
 o  Anomaly detection and diagnosis 
 o  Continuous Authentication
 o  Dynamic re-perimeterisation 
 o  Autonomous Key-Management 
 o  Context-aware security adaptation
 o  Risk assessment at run-time
 o  Trust and Reputation 
 o  System resilience and Survivability
 o  Measures and Metrics of system health and resilience
 o  Proactive vs. Reactive Security Strategies
 o  Synthesis and Evaluation of response strategies 
 o  Data centric self-protection
 o  Bio-inspired models for security
 o  Self-Organisation 

Venue:
The event will be held in conjunction with ESORICS 2014 and hosted in
Wroclaw, historical capital of Silesia, which at various times has
been part of the Kingdom of Poland, Bohemia, the Austrian Empire,
Prussia, and Germany.

Submissions Guidelines: 
The proceedings will be published by Springer in the LNCS
series. Submissions in English, of at most 15 pages and complying with
the LNCS formatting must be submitted before May 21 at
https://www.easychair.org/conferences/?conf=setop2014. At least one
author of each accepted paper must register and present the paper at
the workshop.

Important Dates:
 o  Paper Submission: May 21, 2014
 o  Author Notification: July 10, 2014
 o  Camera Ready Version: August 7, 2014


General Chair: Frédéric Cuppens (Télécom Bretagne, FR)

Program Committee Chairs:

Emil Lupu (Imperial College London, UK)
Joachim Posegga (University of Passau, DE)