ProgrammeThe workshop programme is now available. CIFS workshop takes place on Dec 09, 2020 11 am - 1 pm GMT.
|11:00 – 13:00||CIFS Workshop|
|11:00 – 11:20||Open-source Serverless Architectures: An Evaluation of Apache OpenWhisk||Karim Djemame (University of Leeds, UK), Matthew Parker (University of Leeds, UK) and Daniel Datsev (University of Leeds, UK)|
|11:20 – 11:25||Q&A and discussions with audience|
|11:25 – 11:45||Rule-Based Resource Matchmaking for Composite Application Deployments across IoT-Fog-Cloud Continuums||Josef Spillner (Zurich University of Applied Sciences), Panagiotis Gkikopoulos (Zurich University of Applied Sciences), Alina Buzachis (University of Messina), and Massimo Villari (University of Messina)|
|11:45 – 11:50||Q&A and discussions with audience|
|11:50 – 12:10||Self-Supervised Anomaly Detection from Distributed Traces||Jasmin Bogatinovski (Technische Universitat Berlin), Sasho Nedelkoski (Technische Universitat Berlin), Jorge Cardoso (Huawei Munich Research Center), and Odej Kao (Technische Universitat Berlin)|
|12:10 – 12:15||Q&A and discussions with audience|
|12:15 – 12:35||Blockchain Mobility Solution for Charging Transactions of Electrical Vehicles||Ahmed Afif Monrat (Luleå University of Technology, Sweden), Olov Schelén (Luleå University of Technology, Sweden), and Karl Andersson (Luleå University of Technology, Sweden)|
|12:35 – 12:40||Q&A and discussions with audience|
|12:40 – 13:00||(Invited talk - Industry) Cloud Native Secrets Management||Mircea Cosbuc, Container Solutions|
DescriptionSensors and actuators are becoming pervasive. From empowering smart agri-tech, to cities, to even our own households, sensors and IoT are revolutionizing all dimensions of computing. With advancements in low energy communication standards, low energy computing - from message encodings, to on-the-fly encryption, etc. we are seeing emergence of new paradigms such as Fog, Serverless and Continuum computing which are empowered by high capacity core networks and large datacenters thrown in the mix. Such a scheme of things creates new opportunities but also are rife with challenges which must be overcome. This workshop aims to discuss recent advances around holistic security, deployment modes, communication mediums, line protocols, data collection, and multi-level processing and application development in such systems.
Topics of InterestWe solicit research papers (up to 6p) and technical industry reports (typically 3-6p) on the following topics:
Submitted papers should contain results or reports not already published or submitted elsewhere, in IEEE format. All papers will be peer reviewed by at least three programme committee members. The evaluation will be based on originality, relevance of the problem to the workshop topics, technical strength, quality of results, and clarity of the presentation. The publication of the workshop proceeding with all accepted papers will be by the IEEE and will appear in the same volume as the UCC 2020 and BDCAT 2020 conferences. At least one author of each accepted submission must register in full and attend the workshop to present and all workshop participants must pay the IEEE conference or workshop registration fee.
Technical Programme Committee