Advertisement

Journal of Network and Systems Management

, Volume 23, Issue 3, pp 794–802 | Cite as

Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)

Monitoring and Securing Virtualized Networks and Services
  • Anna Sperotto
  • Guillaume Doyen
  • Steven Latré
  • Marinos Charalambides
  • Jeroen Famaey
  • Petr Velan
  • Pavel Čeleda
Report

Abstract

This article is a report of the IFIP AIMS 2014, which was held at Masaryk University, Czech Republic from June 30 to July 3, 2014. AIMS 2014 focused on the theme “Monitoring and Securing Virtualized Networks and Services”. The focus of the 2014 edition of the AIMS conference series was re-defined in comparison with earlier editions. AIMS 2014 positions itself in the network management community as an educational venue for Ph.D. students and young researchers. The AIMS program included hands-on tutorials and labs, a keynote, technical sessions and Ph.D. Workshop sessions, but also an educational session for training young academics on transversal topics. The highlights on each of the parts of the AIMS 2014 program are summarized in this article.

Keywords

Network management Service management Autonomous infrastructure Security 

Notes

Acknowledgments

We would like to thank the many people who helped make AIMS 2014 such a high-quality and successful event. Firstly, many thanks are addressed to all the authors, who submitted their contributions to AIMS 2014, and to the tutorial and keynote speakers. The great review work performed by the members of both the AIMS TPC and the Ph.D. workshop TPC as well as additional reviewers is highly acknowledged. Additionally, many thanks to the local organizers Iva Krejčí, Alena Janebová, Jan Vykopal and Tomáš Jirsík for enabling the logistics and hosting the AIMS 2014 event. AIMS 2014 was supported by FLAMINGO, a Network of Excellence Project (318488).

References

  1. 1.
    AIMS 2014 Conference Web Site. http://www.aims-conference.org/2014/. Accessed July 2014
  2. 2.
    IFIP TC6 Working Group 6: Management of Networks and Distributed Systems. http://www.simpleweb.org/ifip/. Accessed July 2014
  3. 3.
    Flamingo European (ICT-FP7) Network of Excellence. http://www.fp7-flamingo.eu/. Accessed July 2014
  4. 4.
    Saino, L., Cocora, C., Pavlou, G.: A toolchain for simplifying network simulation setup. In: Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques (SIMUTOOLS ’13), Brussels, Belgium (2013)Google Scholar
  5. 5.
    Emulab—Network Emulation Testbed. http://www.emulab.net/. Accessed August 2014
  6. 6.
    Fed4FIRE—Federation for Fire. http://www.fed4fire.eu/. Accessed August 2014
  7. 7.
    POX—Python-based OpenFlow controller. http://www.noxrepo.org/pox/about-pox/. Accessed August 2014
  8. 8.
    Open vSwitch—An Open Virtual Switch. http://openvswitch.org/. Accessed August 2014
  9. 9.
    Kouřil, D., Rebok, T., Jirsík, T., Čegan, J., Drašar, M., Vizváry, M., Vykopal, J.: Cloud-based Testbed for Simulation of Cyber Attacks. In: Proceedings of the Network Operations and Management Symposium (NOMS 2014), Krakow, Poland (2014)Google Scholar
  10. 10.
    KYPO—Cybernetic Proving Ground. http://www.muni.cz/ics/kypo. Accessed August 2014
  11. 11.
    Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Stiller, B. (eds.): Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)—Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science (LNCS), vol. 8508. Springer (2014)Google Scholar
  12. 12.
    Doyen, G., Waldburger, M., Sperotto, A., Čeleda, P., Gorricho, J.L., Schaaf, T., Serrat, J.: Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet. J. Netw. Syst. Manag. 22(2), 289–296 (2014)Google Scholar
  13. 13.
    Almeroth, K.: Networking Conferences Statistics. http://www.cs.ucsb.edu/almeroth/conf/stats/#aims. Accessed July 2014

Copyright information

© The Author(s) 2015

Authors and Affiliations

  • Anna Sperotto
    • 1
  • Guillaume Doyen
    • 2
  • Steven Latré
    • 3
  • Marinos Charalambides
    • 4
  • Jeroen Famaey
    • 3
  • Petr Velan
    • 5
  • Pavel Čeleda
    • 5
  1. 1.Faculty for Electrical Engineering, Mathematics, and Computer ScienceUniversity of TwenteEnschedeThe Netherlands
  2. 2.Charles Delaunay Institute (ICD)Troyes University of TechnologyTroyes CedexFrance
  3. 3.Department of Mathematics and Computer ScienceUniversity of Antwerp - iMindsAntwerpBelgium
  4. 4.Department of Electronic and Electrical EngineeringUniversity College LondonLondonUK
  5. 5.Institute of Computer ScienceMasaryk UniversityBrnoCzech Republic

Personalised recommendations