Advertisement

Journal of Network and Systems Management

, Volume 26, Issue 4, pp 1101–1109 | Cite as

Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016)

Management and Security in the Age of Hyperconnectivity
  • Remi Badonnel
  • Robert Koch
  • Martin Drasar
  • Aiko Pras
  • Volker Eiseler
  • Lars Stiemert
  • Sebastian Seeber
  • Daphne Tuncer
  • Marinos Charalambides
  • Gabi Dreo Rodosek
Report

Abstract

This article is a report of the IFIP AIMS 2016, which was held at Universität der Bundeswehr München, Germany from June 20 to June 23, 2016. AIMS 2016 focused on the theme “Management and Security in the Age of Hyperconnectivity”. The AIMS conference positions itself in the network management community as an educational venue for young researchers and Ph.D. students. The AIMS program included keynotes, technical sessions and Ph.D. Workshop sessions, but also hands-on labs and an educational panel for training young academics. The highlights on each of the parts of the AIMS 2016 program are summarized in this article.

Keywords

Network management Service management Autonomous infrastructures Security 

Notes

Acknowledgements

We would like to thank the many people who helped make AIMS 2016 such a high-quality and successful event. Firstly, many thanks are addressed to all the authors, who submitted their contributions to AIMS 2016, and to the hands-on tutorial and keynote speakers. The great review work performed by the members of both the AIMS TPC and the Ph.D. workshop TPC as well as additional reviewers is highly acknowledged. Additionally, many thanks to the local organizers, in particular Volker Eiseler, for enabling the logistics and hosting the AIMS 2016 event. AIMS 2016 was supported by FLAMINGO, a Network of Excellence Project (318488).

References

  1. 1.
    IFIP AIMS 2016 Conference Web Site. http://www.aims-conference.org/2016/. Accessed July 2016
  2. 2.
    IFIP TC6 Working Group 6: Management of Networks and Distributed Systems. http://www.simpleweb.org/ifip/. Accessed July 2016
  3. 3.
    Flamingo European (ICT-FP7) Network of Excellence. http://www.fp7-flamingo.eu/. Accessed July 2016
  4. 4.
    Sperotto, A., van der Toorn, O., van Rijswijk-Deij, R.: TIDE: threat identification using active DNS measurements. In: Proceedings of the SIGCOMM Posters and Demos (SIGCOMM 2017), pp. 65–67 (2017)Google Scholar
  5. 5.
    Liotta, A., Di Fatta, G.: Special issue on data mining for monitoring and managing systems and networks. J. Netw. Syst. Manag. 22(2) (2014)Google Scholar
  6. 6.
    Zhao, S., Medhi, D.: Application-aware network design for hadoop mapreduce optimization using software-defined networking. IEEE Trans. Netw. Serv. Manag. 14(4), 804–816 (2017)CrossRefGoogle Scholar
  7. 7.
    Seeber S., Dreo Rodosek G., Hurel G., Badonnel R.: Analysis and evaluation of OpenFlow message usage for security applications. In: Proceedings of the 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), June 2016, Munich, Germany. Lecture Notes in Computer Science, LNCS 9701. Springer International Publishing (2016)Google Scholar
  8. 8.
    Steinberger J., Kuhnert B., Sperotto A., Baier H., Pras A.: In whom do we trust—sharing security events. In: Proceedings of the 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), June 2016, Munich, Germany. Lecture Notes in Computer Science, LNCS 9701. Springer International Publishing (2016)Google Scholar
  9. 9.
    Poullie O., Stiller B.: Cloud flat rates enabled via fair multi-resource consumption. In: Proceedings of the 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), June 2016, Munich, Germany. Lecture Notes in Computer Science, LNCS 9701. Springer International Publishing (2016)Google Scholar
  10. 10.
    Badonnel, R., Koch, R., Pras, A., Drasar, M., Stiller, B. (eds.): Proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016)—Management and Security in the Age of Hyperconnectivity. Lecture Notes in Computer Science (LNCS), vol. 9701. Springer (2016)Google Scholar
  11. 11.
    Sperotto, A., Doyen, G., Latre, S., Charalambides, M., Famaey, J., Velan, P., Celeda, P.: Report on the 8th international conference on autonomous infrastructure, management, and security (AIMS 2014): monitoring and securing virtualized networks and services. J. Netw. Syst. Manag. 23(3), 794–802 (2015)CrossRefGoogle Scholar
  12. 12.
    Almeroth, K.: Networking Conferences Statistics. http://www.cs.ucsb.edu/~almeroth/conf/stats/#aims. Accessed July 2016

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Remi Badonnel
    • 1
  • Robert Koch
    • 2
  • Martin Drasar
    • 3
  • Aiko Pras
    • 4
  • Volker Eiseler
    • 2
  • Lars Stiemert
    • 2
  • Sebastian Seeber
    • 2
  • Daphne Tuncer
    • 5
  • Marinos Charalambides
    • 5
  • Gabi Dreo Rodosek
    • 2
  1. 1.Telecom NancyUniversity of Lorraine, LORIA - INRIAVillers Lès NancyFrance
  2. 2.Universität der Bundeswehr MünchenNeubibergGermany
  3. 3.Institute of Computer ScienceMasaryk UniversityBrnoCzech Republic
  4. 4.Faculty for Electrical Engineering, Mathematics, and Computer ScienceUniversity of TwenteEnschedeThe Netherlands
  5. 5.Department of Electronic and Electrical EngineeringUniversity College LondonLondonUK

Personalised recommendations