Visit www.Cyberc.org and submit your research paper to attend this great event.
CyberC (International Conference on Cyber-enabled distributed computing and knowledge discovery) is an international conference on cyber-enabled technology. It covers cyber-networks, data mining, cyber security, distributed computing, mobile computing, cognitive computing, cloud computing, computing tools, applications, and system performance. CyberC offers a forum for presentation and discussion of innovative ideas, research results, applications, and experience for network-enabled distributed computing and knowledge discovery technologies. This video is an interview and the background information is below.
Dr. Chih-Lin I , Chief Scientist, Wireless Technologies, China Mobile Research Institute
Chih-Lin I received her Ph.D. degree in electrical engineering from Stanford University. She has been working at multiple world-class companies and research institutes leading the R&D, including AT&T Bell Labs; Director of AT&T HQ, Director of ITRI Taiwan, and VPGD of ASTRI Hong Kong. She received the IEEE Trans. COM Stephen Rice Best Paper Award, is a winner of the CCCP National 1000 Talent Program, and has won the 2015 Industrial Innovation Award of IEEE Communication Society for Leadership and Innovation in Next-Generation Cellular Wireless Networks.
In 2011, she joined China Mobile as its Chief Scientist of wireless technologies, established the Green Communications Research Center, and launched the 5G Key Technologies R&D. She is spearheading major initiatives including 5G, C-RAN, high energy efficiency system architectures, technologies and devices; and green energy.
Keynote Topic in CyberC 2017: SDN/NFV via SBA&CUDU
Abstract: From Green to Soft, the revolutionary path towards future 5G has been charted out. Since its proposal in 2012, SDN/NFV has been viewed as an essential element towards this end. In this talk, we will share CMCC’s endeavor on the path towards SOFT 5G. In particular, it will be presented how the philosophy of SDN/NFV has been adopted and implemented in our networks, from SBA-based cthe ore network to CU-DU-based radio access networks. In fact, C-RAN, which has been proposed by CMCC in 2009, has conceived the NFV idea since its birth. The achievements at the earlier stage will be introduced, including the deployment of centralization, trials on CoMP, some pioneering work on RAN virtualization. Then, the latest progress on RAN cloudification/virtualization will be detailed from various perspectives such as hypervisor, HW platform and MANO systems. Finally other key 5G components such as big data analytics, mobile edge computing etc. will also be touched.
Anup Kumar, PhD, Professor, University of Louisville, Kentucky, USA
Anup Kumar completed his Ph.D. from North Carolina State University and is currently a Professor of CECS Department at the University of Louisville. He is also the Director of Mobile Information Network and Distributed Systems (MINDS) Lab. His research interests include web services, wireless networks, distributed system modeling, and simulation. He has co-edited a book titled, “Handbook of Mobile Systems: Applications ands Services” published by CRC press in 2012. He is a Senior Member of IEEE.
Topic: Access Control Security – Why and How Access Control Policies are Tested and Verified?
Abstract: SDN/NFV, cloud, and many other online systems relies Access control (AC) to protect the secret financial, enterprise, organization, healthcare, defense, and various IT resources/services. In order to protect the classified resources, the security specialist needs to compose a set of AC policies (e.g., in XACML policies) to prevent unintended access. However, the current AC policies are composed and deployed into an AC system without comprehensive security tests and verifications. This results in many AC flaws (e.g., information or service leaks) in the systems and these AC flaws are normally hidden from us until observable damages (e.g., secret data leakage) are caused. This paves the way for cybersecurity hackers or insiders to steal the IT assets by exploring the access control weakness.
Recently NIST has released several specifications in order to help government and enterprises to enhance the nation's critical access control security, such as NIST SP 800-192: Verification and Test Methods for Access Control Policies/Models. As stated by NIST, many of the access control incidents (e.g., data breaches, insiders) are caused by misconfigured access control policies.
In this talk, we will explore the state-of-art access control policy testing and verification approaches. Examples are (i) Access Control Polity Tool and (ii) Security Policy Tool, which respectively delivers a solution for testing, analyzing, inspecting, and correcting the access control flaws. Primary information can be found at http://csrc.nist.gov/groups/SNS/acpt/acpt-beta.html and https://securitypolicytool.com .