Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016)

Management and Security in the Age of Hyperconnectivity

  • Report
  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

This article is a report of the IFIP AIMS 2016, which was held at Universität der Bundeswehr München, Germany from June 20 to June 23, 2016. AIMS 2016 focused on the theme “Management and Security in the Age of Hyperconnectivity”. The AIMS conference positions itself in the network management community as an educational venue for young researchers and Ph.D. students. The AIMS program included keynotes, technical sessions and Ph.D. Workshop sessions, but also hands-on labs and an educational panel for training young academics. The highlights on each of the parts of the AIMS 2016 program are summarized in this article.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Notes

  1. Domain Name System.

  2. Structured Query Language.

  3. Software-Defined Networking.

  4. Flow-based Event Exchange Format.

  5. Internet Service Providers.

  6. Service-Level Agreement.

  7. Distributed Denial of Service.

References

  1. IFIP AIMS 2016 Conference Web Site. http://www.aims-conference.org/2016/. Accessed July 2016

  2. IFIP TC6 Working Group 6: Management of Networks and Distributed Systems. http://www.simpleweb.org/ifip/. Accessed July 2016

  3. Flamingo European (ICT-FP7) Network of Excellence. http://www.fp7-flamingo.eu/. Accessed July 2016

  4. Sperotto, A., van der Toorn, O., van Rijswijk-Deij, R.: TIDE: threat identification using active DNS measurements. In: Proceedings of the SIGCOMM Posters and Demos (SIGCOMM 2017), pp. 65–67 (2017)

  5. Liotta, A., Di Fatta, G.: Special issue on data mining for monitoring and managing systems and networks. J. Netw. Syst. Manag. 22(2) (2014)

  6. Zhao, S., Medhi, D.: Application-aware network design for hadoop mapreduce optimization using software-defined networking. IEEE Trans. Netw. Serv. Manag. 14(4), 804–816 (2017)

    Article  Google Scholar 

  7. Seeber S., Dreo Rodosek G., Hurel G., Badonnel R.: Analysis and evaluation of OpenFlow message usage for security applications. In: Proceedings of the 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), June 2016, Munich, Germany. Lecture Notes in Computer Science, LNCS 9701. Springer International Publishing (2016)

  8. Steinberger J., Kuhnert B., Sperotto A., Baier H., Pras A.: In whom do we trust—sharing security events. In: Proceedings of the 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), June 2016, Munich, Germany. Lecture Notes in Computer Science, LNCS 9701. Springer International Publishing (2016)

  9. Poullie O., Stiller B.: Cloud flat rates enabled via fair multi-resource consumption. In: Proceedings of the 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), June 2016, Munich, Germany. Lecture Notes in Computer Science, LNCS 9701. Springer International Publishing (2016)

  10. Badonnel, R., Koch, R., Pras, A., Drasar, M., Stiller, B. (eds.): Proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016)—Management and Security in the Age of Hyperconnectivity. Lecture Notes in Computer Science (LNCS), vol. 9701. Springer (2016)

  11. Sperotto, A., Doyen, G., Latre, S., Charalambides, M., Famaey, J., Velan, P., Celeda, P.: Report on the 8th international conference on autonomous infrastructure, management, and security (AIMS 2014): monitoring and securing virtualized networks and services. J. Netw. Syst. Manag. 23(3), 794–802 (2015)

    Article  Google Scholar 

  12. Almeroth, K.: Networking Conferences Statistics. http://www.cs.ucsb.edu/~almeroth/conf/stats/#aims. Accessed July 2016

Download references

Acknowledgements

We would like to thank the many people who helped make AIMS 2016 such a high-quality and successful event. Firstly, many thanks are addressed to all the authors, who submitted their contributions to AIMS 2016, and to the hands-on tutorial and keynote speakers. The great review work performed by the members of both the AIMS TPC and the Ph.D. workshop TPC as well as additional reviewers is highly acknowledged. Additionally, many thanks to the local organizers, in particular Volker Eiseler, for enabling the logistics and hosting the AIMS 2016 event. AIMS 2016 was supported by FLAMINGO, a Network of Excellence Project (318488).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Remi Badonnel.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Badonnel, R., Koch, R., Drasar, M. et al. Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016). J Netw Syst Manage 26, 1101–1109 (2018). https://doi.org/10.1007/s10922-018-9460-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-018-9460-5

Keywords