
From nobody Thu Apr  2 07:38:04 2015
Return-Path: <granville@inf.ufrgs.br>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E005F1A9113 for <nmrg@ietfa.amsl.com>; Thu,  2 Apr 2015 07:38:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.739
X-Spam-Level: 
X-Spam-Status: No, score=0.739 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_EQ_BR=0.955, HOST_EQ_BR=1.295, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 98V-E4e3LBkN for <nmrg@ietfa.amsl.com>; Thu,  2 Apr 2015 07:38:00 -0700 (PDT)
Received: from delivery1.ufrgs.br (delivery1.ufrgs.br [143.54.2.211]) by ietfa.amsl.com (Postfix) with ESMTP id EA2421A910E for <nmrg@irtf.org>; Thu,  2 Apr 2015 07:37:59 -0700 (PDT)
Received: from delivery1.ufrgs.br (localhost [127.0.0.1]) by delivery1.ufrgs.br (Postfix) with ESMTP id F2447300721 for <nmrg@irtf.org>; Thu,  2 Apr 2015 11:37:57 -0300 (BRT)
Received: from msa1.ufrgs.br (msa1.ufrgs.br [143.54.2.208]) by delivery1.ufrgs.br (Postfix) with ESMTP id 535493D70D for <nmrg@irtf.org>; Thu,  2 Apr 2015 11:37:57 -0300 (BRT)
From: Lisandro Zambenedetti Granville <granville@inf.ufrgs.br>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Message-Id: <38C07DF4-AFAC-471A-8A11-0084A6C2627C@inf.ufrgs.br>
Date: Thu, 2 Apr 2015 11:37:54 -0300
To: nmrg@irtf.org
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
X-Mailer: Apple Mail (2.2070.6)
X-AV-Checked: ClamAV using ClamSMTP
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/yuvRkK8vJP0n3p8hC3rmaoJn4YA>
Subject: [nmrg] 36th NMRG meeting - Call for Contributions
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2015 14:38:03 -0000

Dear all,

We are glad to announce that the 36th NMRG meeting will take
place in  Ottawa, May 15th 2015,  during IM 2015, as previously
mentioned in this mailing list. As planned from a previous
poll, this meeting will be focused on security aspects.

Please, find below the Call for Contributions, and fell free
to distribute it to potential interested colleagues.

Best regards,

Olivier & Lisandro
NMRG Co-Chairs


---


                  CALL FOR CONTRIBUTIONS

      Managing Security Aspects of Internet Protocols

   36th Network Management Research Group (NMRG) meeting
         IM 2015 - May 15th, 2015 =E2=80=93 Ottawa, Canada


Recently,  a  number   of  leaked  reports   describing  the
practices of countries tapping communication infrastructures
of other  nations  led  to  international  severe diplomatic
situations.  Security   flaws  have  been  of  interest  for
decades,  but they took another  dimension after the Snowden
case.  Internet  protocols  can present vulnerabilities that
allow  an   attacker   to  learn   and   exploit   sensitive
information; and users are often unaware of this situation.

The 36th NMRG  meeting will be  centered on security aspects
of Internet  protocols that need to be properly managed. The
main goal  of the meeting  is to  bring together researchers
and practitioners on  the  field  to  discuss  key  security
management  requirements,  as  well  as  identify   priority
research  challenges  that  need  to be tackled.  Reports on
practical  experiences   on  security  aspects  of  Internet
protocols  are  of  special  interest.  Examples of research
questions include, but are not limited to:

- How well is BCP38 (IP spoofing) implemented?
- How much worse is the amplification of DNSSEC?
- What is the behavior of botnets / DGAs?
- What privacy sensitive data is leaked from various
  protocols, without users awareness?

This  36th  NMRG   meeting   will  be  co-located  with  the
IFIP/IEEE  International  Symposium  on  Integrated  Network
Management (IM 2015),  held in Ottawa,  Canada.  This  is an
important  opportunity  because  IM 2015 is a key conference
that  brings together  the network  and  services management
community.

We  invite  interested  speakers  to  briefly describe their
potential  talks  informing title,  speaker name, and topic.
Contributions  should  be  submitted  via e-mail to the NMRG
mailing list (nmrg@irtf.org).

Best regards,

Olivier Festor & Lisandro Zambenedetti Granville
NMRG Co-Chair=


From nobody Thu Apr  2 09:31:35 2015
Return-Path: <william.atwood@concordia.ca>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0786B1ACE46 for <nmrg@ietfa.amsl.com>; Thu,  2 Apr 2015 09:31:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.545
X-Spam-Level: 
X-Spam-Status: No, score=-3.545 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_SOFTFAIL=0.665, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id stb8XPOVJWNS for <nmrg@ietfa.amsl.com>; Thu,  2 Apr 2015 09:31:31 -0700 (PDT)
Received: from oldperseverance.encs.concordia.ca (oldperseverance.encs.concordia.ca [132.205.96.92]) by ietfa.amsl.com (Postfix) with ESMTP id E660D1B2CDF for <nmrg@irtf.org>; Thu,  2 Apr 2015 09:31:30 -0700 (PDT)
Received: from [127.0.0.1] (bill@poise.encs.concordia.ca [132.205.2.209]) by oldperseverance.encs.concordia.ca (envelope-from william.atwood@concordia.ca) (8.13.7/8.13.7) with ESMTP id t32GVTSA018884 for <nmrg@irtf.org>; Thu, 2 Apr 2015 12:31:29 -0400
Message-ID: <551D6EE3.9080300@concordia.ca>
Date: Thu, 02 Apr 2015 12:31:31 -0400
From: William Atwood <william.atwood@concordia.ca>
Organization: Concordia University, Montreal
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: nmrg@irtf.org
References: <38C07DF4-AFAC-471A-8A11-0084A6C2627C@inf.ufrgs.br>
In-Reply-To: <38C07DF4-AFAC-471A-8A11-0084A6C2627C@inf.ufrgs.br>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
X-Scanned-By: MIMEDefang 2.58 on oldperseverance.encs.concordia.ca at 2015-04-02 12:31:29 EDT
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/UkydkktsmyCdfDG6U1569_NcP20>
Subject: Re: [nmrg] 36th NMRG meeting - Call for Contributions
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2015 16:31:34 -0000

Olivier & Lisandro,

A question about registration:

The NMRG meeting appears to have the characteristics of a "Workshop",
although it is not (yet) listed on the IM 2015 workshop page.

I assume that participants in this NMRG meeting should register for the
Friday "Workshop day", unless they are also attending the IM 2015
sessions, in which case they should register for "Add to Reg
TUTORIAL/WORKSHOP DAY".  Please confirm.

  Bill


On 02/04/2015 10:37 AM, Lisandro Zambenedetti Granville wrote:
> Dear all,
> 
> We are glad to announce that the 36th NMRG meeting will take
> place in  Ottawa, May 15th 2015,  during IM 2015, as previously
> mentioned in this mailing list. As planned from a previous
> poll, this meeting will be focused on security aspects.
> 
> Please, find below the Call for Contributions, and fell free
> to distribute it to potential interested colleagues.
> 
> Best regards,
> 
> Olivier & Lisandro
> NMRG Co-Chairs
> 
> 
> ---
> 
> 
>                   CALL FOR CONTRIBUTIONS
> 
>       Managing Security Aspects of Internet Protocols
> 
>    36th Network Management Research Group (NMRG) meeting
>          IM 2015 - May 15th, 2015 – Ottawa, Canada
> 
> 
> Recently,  a  number   of  leaked  reports   describing  the
> practices of countries tapping communication infrastructures
> of other  nations  led  to  international  severe diplomatic
> situations.  Security   flaws  have  been  of  interest  for
> decades,  but they took another  dimension after the Snowden
> case.  Internet  protocols  can present vulnerabilities that
> allow  an   attacker   to  learn   and   exploit   sensitive
> information; and users are often unaware of this situation.
> 
> The 36th NMRG  meeting will be  centered on security aspects
> of Internet  protocols that need to be properly managed. The
> main goal  of the meeting  is to  bring together researchers
> and practitioners on  the  field  to  discuss  key  security
> management  requirements,  as  well  as  identify   priority
> research  challenges  that  need  to be tackled.  Reports on
> practical  experiences   on  security  aspects  of  Internet
> protocols  are  of  special  interest.  Examples of research
> questions include, but are not limited to:
> 
> - How well is BCP38 (IP spoofing) implemented?
> - How much worse is the amplification of DNSSEC?
> - What is the behavior of botnets / DGAs?
> - What privacy sensitive data is leaked from various
>   protocols, without users awareness?
> 
> This  36th  NMRG   meeting   will  be  co-located  with  the
> IFIP/IEEE  International  Symposium  on  Integrated  Network
> Management (IM 2015),  held in Ottawa,  Canada.  This  is an
> important  opportunity  because  IM 2015 is a key conference
> that  brings together  the network  and  services management
> community.
> 
> We  invite  interested  speakers  to  briefly describe their
> potential  talks  informing title,  speaker name, and topic.
> Contributions  should  be  submitted  via e-mail to the NMRG
> mailing list (nmrg@irtf.org).
> 
> Best regards,
> 
> Olivier Festor & Lisandro Zambenedetti Granville
> NMRG Co-Chair
> _______________________________________________
> nmrg mailing list
> nmrg@irtf.org
> https://www.irtf.org/mailman/listinfo/nmrg
> 

-- 
Dr. J.W. Atwood, Eng.             tel:   +1 (514) 848-2424 x3046
Distinguished Professor Emeritus  fax:   +1 (514) 848-2830
Department of Computer Science
   and Software Engineering
Concordia University EV 3.185     email:william.atwood@concordia.ca
1455 de Maisonneuve Blvd. West    http://users.encs.concordia.ca/~bill
Montreal, Quebec Canada H3G 1M8


From nobody Fri Apr  3 10:29:55 2015
Return-Path: <lei.liu16@gmail.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2461D1A6EDB for <nmrg@ietfa.amsl.com>; Thu,  2 Apr 2015 22:24:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.951
X-Spam-Level: 
X-Spam-Status: No, score=0.951 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kCKsIGNRBXEh for <nmrg@ietfa.amsl.com>; Thu,  2 Apr 2015 22:24:16 -0700 (PDT)
Received: from mail-la0-x229.google.com (mail-la0-x229.google.com [IPv6:2a00:1450:4010:c03::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D3D41A3BA7 for <nmrg@irtf.org>; Thu,  2 Apr 2015 22:24:15 -0700 (PDT)
Received: by labe2 with SMTP id e2so73856727lab.3 for <nmrg@irtf.org>; Thu, 02 Apr 2015 22:24:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:from:date:message-id:subject:to:content-type; bh=cG+cayCxT5HteD0SiLfojwmABjy+Pbwo5hdSFh+YSCA=; b=NdSD/1vxNigwtfs007qq38u/WHZSKb59wvWZxXDSvGIw2cB0mzGNiZmGy0ILYGmCTb yn0n04PbMHNTodwZpiBJWUtIM6mEza267FgJ8d8c6j/eCiRf/4N4+6RPkcb/iq4Qu8JM J3I4vF5nH71y271yqtNJeu6VcdJf1Y1jkSvWUbllvopgG3Bg4M34dbOK9GL4LGm9vLFn zheK1Qy1eKGUurIAM/0D1LypY//UgkmBGHZ1SY31BdCpBcJYM7uLKrNwmUrcQq4NF3sA p7R49l1kRgMudEwP1iEcn2CucVhTh6mVxp98lR+5JHhyC2pPxc82n8jLG96E7cYRHlGl AyYA==
X-Received: by 10.152.2.105 with SMTP id 9mr705579lat.16.1428038653686; Thu, 02 Apr 2015 22:24:13 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.36.139 with HTTP; Thu, 2 Apr 2015 22:23:53 -0700 (PDT)
From: "Lei Liu (Chris)" <lei.liu16@gmail.com>
Date: Fri, 3 Apr 2015 13:23:53 +0800
Message-ID: <CAEststmM4E2anqz5Pba1fJw7A7febqjn9CAyLfY3LNAt+bW=Yw@mail.gmail.com>
To: cfp@grid.chu.edu.tw
Content-Type: multipart/alternative; boundary=089e012291a2adba7a0512cb289e
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/8d7zKrg2xY4Zls46L2G4uDTGKu4>
X-Mailman-Approved-At: Fri, 03 Apr 2015 10:29:54 -0700
Subject: [nmrg] IEEE CIT-2015,Liverpool, England, UK, 26-28 October 2015
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2015 05:24:18 -0000

--089e012291a2adba7a0512cb289e
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

[Please accept our apologies if you receive multiple copies of this email]

**************************** IEEE CIT-2015 CFP ***************************

*The 15th IEEE International Conference on Computer and Information
Technology*

*(CIT-2015)*

http://cse.stfx.ca/~cit2015/

*Liverpool, England, UK, 26-28 October 2015 *

*Sponsored by*
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable
Computing (TCSC)

INTRODUCTION
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
CIT has become a major platform for researchers and industry practitioners
from different fields of computer and information technology. Each year,
CIT attendees appreciate and benefit from multidisciplinary exchanges in
computer and information technology. In previous years, CIT has attracted
many high quality research papers spanning over the various aspects of
information technology, computing science and computer engineering. These
papers highlight foundational work that strives to push beyond limits of
existing computer technologies, including experimental efforts, innovative
systems, and investigations that identify weaknesses in existing IT
services.

The CIT-2015 conference is the 15th edition of the highly successful
International Conference on Computer and Information Technology, and will
be held on 26-28 October 2015 in Liverpool, UK. The goal of CIT-2015 is to
provide a forum for scientists, engineers and researchers to discuss and
exchange novel ideas, results, experiences and work-in-process on all
aspects of computer and information technology.

Liverpool is a fantastic and popular tourist city destination in the UK.
Several areas of the city centre were granted World Heritage Site status by
UNESCO in 2004. Referred to as the Liverpool Maritime Mercantile City, the
site comprises six separate locations in the city including the Pier Head,
Albert Dock and William Brown Street and includes many of the city's most
famous landmarks.

SCOPE AND TPOCIS

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Topics of particular interests include the following tracks, but are not
limited to:

=C2=B7       Information Technology

=C2=B7       Computer Science

=C2=B7       Signal Processing

=C2=B7       Networking and Internet of Things

=C2=B7       Reliability, Security, Privacy and Trust

=C2=B7       Applications, Business and Social Issues

=C2=B7       Database and Data Management

=C2=B7       Microwave and Radar

=C2=B7       System Software and Software Engineering

=C2=B7       Pattern Recognition, Data Mining and Artificial Intelligence

=C2=B7       Information Technology for Biomedicine

=C2=B7       Wireless Communications

=C2=B7       Mobile Multimedia Communications

=C2=B7       Wireless and Mobile Computing

=C2=B7       Future Internet

=C2=B7       Cellular Network and 5G

IMPORTANT DATES
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Submission Deadline:

15 June 2015

Authors Notification:

15 August 2015

Camera-ready Paper Due:

15 September 2015

Registration Due:

15 September 2015

Conference Date:

26-28 October 2015

PAPER SUBMISSION GUIDELINE
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D

All papers need to be submitted electronically through the conference
website (http://cse.stfx.ca/~cit2015/sub/) with PDF format. The materials
presented in the papers should not be published or under submission
elsewhere. Each paper is limited to 8 pages (or 10 pages with over length
charge) including figures and references using IEEE Computer Society
Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You
can confirm the IEEE Computer Society Proceedings Author Guidelines at the
following web page: http://www.computer.org/web/cs-cps/

Once accepted, the paper will be included into the IEEE conference
proceedings published by IEEE Computer Society Press (indexed by EI). At
least one of the authors of any accepted paper is requested to register the
paper at the conference.

--089e012291a2adba7a0512cb289e
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><p class=3D"MsoNormal" align=3D"center" style=3D"text-alig=
n:center"><a name=3D"OLE_LINK1"><span lang=3D"EN-GB" style=3D"font-size:12p=
t;font-family:&#39;Times New Roman&#39;,serif;color:rgb(51,51,255)">[Please=
 accept our
apologies if you receive multiple copies of this email]</span></a><span lan=
g=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,s=
erif;color:rgb(51,51,255)"></span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span l=
ang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;=
,serif">****************************
IEEE CIT-2015 CFP ***************************</span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><b><spa=
n lang=3D"EN-GB" style=3D"font-size:10.5pt;font-family:&#39;Times New Roman=
&#39;,serif">The 15th IEEE International Conference on Computer and
Information Technology</span></b><span lang=3D"EN-GB" style=3D"font-size:10=
.5pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><b><spa=
n lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#=
39;,serif">(CIT-2015)</span></b><span lang=3D"EN-GB" style=3D"font-size:12p=
t;font-family:&#39;Times New Roman&#39;,serif"></span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span l=
ang=3D"EN-GB"><a href=3D"http://cse.stfx.ca/~cit2015/"><span style=3D"font-=
size:12pt;font-family:&#39;Times New Roman&#39;,serif">http://cse.stfx.ca/~=
cit2015/</span></a></span><span lang=3D"EN-GB" style=3D"font-size:12pt;font=
-family:&#39;Times New Roman&#39;,serif"></span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><b><spa=
n lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#=
39;,serif">Liverpool, England, UK, 26-28 October 2015 </span></b><span lang=
=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,se=
rif"></span></p>

<p class=3D"MsoNormal"><b><span lang=3D"EN-GB" style=3D"font-size:12pt;font=
-family:&#39;Times New Roman&#39;,serif">Sponsored by</span></b><span lang=
=3D"EN-GB" style=3D"font-size:11.5pt;font-family:&#39;Times New Roman&#39;,=
serif"><br>
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable Comput=
ing
(TCSC)</span></p>

<p class=3D"MsoNormal" style=3D"text-align:justify"><span lang=3D"EN-GB" st=
yle=3D"font-size:12pt;line-height:115%;font-family:&#39;Times New Roman&#39=
;,serif">INTRODUCTION<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
CIT has become a major platform for researchers and industry practitioners =
from
different fields of computer and information technology. Each year, CIT
attendees appreciate and benefit from multidisciplinary exchanges in comput=
er
and information technology. In previous years, CIT has attracted many high
quality research papers spanning over the various aspects of information
technology, computing science and computer engineering. These papers highli=
ght
foundational work that strives to push beyond limits of existing computer
technologies, including experimental efforts, innovative systems, and
investigations that identify weaknesses in existing IT services.</span></p>

<p class=3D"MsoNormal" style=3D"text-align:justify"><span lang=3D"EN-GB" st=
yle=3D"font-size:12pt;line-height:115%;font-family:&#39;Times New Roman&#39=
;,serif">The CIT-2015 conference is the 15th
edition of the highly successful International Conference on Computer and
Information Technology, and will be held on 26-28 October 2015 in Liverpool=
,
UK. The goal of CIT-2015 is to provide a forum for scientists, engineers an=
d
researchers to discuss and exchange novel ideas, results, experiences and
work-in-process on all aspects of computer and information technology.</spa=
n></p>

<p class=3D"MsoNormal" style=3D"text-align:justify"><span lang=3D"EN-GB" st=
yle=3D"font-size:12pt;line-height:115%;font-family:&#39;Times New Roman&#39=
;,serif">Liverpool is a fantastic and popular
tourist city destination in the UK. Several areas of the city centre were
granted World Heritage Site status by UNESCO in 2004. Referred to as the
Liverpool Maritime Mercantile City, the site comprises six separate locatio=
ns
in the city including the Pier Head, Albert Dock and William Brown Street a=
nd
includes many of the city&#39;s most famous landmarks. </span><span lang=3D=
"EN-GB"></span></p>

<p class=3D""><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39=
;Times New Roman&#39;,serif">SCOPE AND
TPOCIS</span></p>

<p class=3D""><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39=
;Times New Roman&#39;,serif">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D</span></p>

<p><span lang=3D"EN-GB">Topics of particular interests include the followin=
g
tracks, but are not limited to: </span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Information Technology</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Computer Science</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Signal Processing</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Networking and Internet of Things</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Reliability, Security, Privacy and
Trust</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Applications, Business and Social
Issues</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Database and Data Management</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Microwave and Radar</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">System Software and Software
Engineering</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Pattern Recognition, Data Mining and
Artificial Intelligence</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Information Technology for
Biomedicine</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Wireless Communications</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Mobile Multimedia Communications</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Wireless and Mobile Computing</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Future Internet</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Cellular Network and 5G</span></p>

<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"font-size:12pt;font-fa=
mily:&#39;Times New Roman&#39;,serif">IMPORTANT DATES<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</span></p>

<div align=3D"center">

<table class=3D"" border=3D"0" cellspacing=3D"3" cellpadding=3D"0" width=3D=
"100%" style=3D"width:100%">
 <tbody><tr>
  <td width=3D"30%" style=3D"width:30.7%;padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Su=
bmission Deadline:</span></p>
  </td>
  <td width=3D"68%" style=3D"width:68.32%;padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">15 June 2015</span><span lang=3D"EN-GB" style=3D"font-size:12pt;f=
ont-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
 <tr>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Au=
thors Notification:</span></p>
  </td>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">15 August 2015</span><span lang=3D"EN-GB" style=3D"font-size:12pt=
;font-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
 <tr>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Ca=
mera-ready Paper Due:</span></p>
  </td>
  <td style=3D"padding:0.75pt;background-image:initial;background-repeat:in=
itial">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">15 September 2015</span><span lang=3D"EN-GB" style=3D"font-size:1=
2pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
 <tr>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Re=
gistration Due:</span></p>
  </td>
  <td style=3D"padding:0.75pt;background-image:initial;background-repeat:in=
itial">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">15 September 2015</span><span lang=3D"EN-GB" style=3D"font-size:1=
2pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
 <tr>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Co=
nference Date:</span></p>
  </td>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">26-28 October 2015</span><span lang=3D"EN-GB" style=3D"font-size:=
12pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
</tbody></table>

</div>

<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"font-size:12pt;font-fa=
mily:&#39;Times New Roman&#39;,serif">PAPER SUBMISSION GUIDELINE<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D</span></p>

<p class=3D"MsoNormal" style=3D"text-align:justify"><span lang=3D"EN-GB" st=
yle=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">All pape=
rs need to be submitted
electronically through the conference website (</span><span lang=3D"EN-GB">=
<a href=3D"http://cse.stfx.ca/~cit2015/sub/"><span style=3D"font-size:12pt;=
font-family:&#39;Times New Roman&#39;,serif">http://cse.stfx.ca/~cit2015/su=
b/</span></a></span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:&#39;Times New Roman&#39;,serif">) with PDF format. The materials
presented in the papers should not be published or under submission elsewhe=
re. Each
paper is limited to 8 pages </span><span lang=3D"EN-US" style=3D"color:blac=
k">(or 10 pages with over length charge)</span><span lang=3D"EN-US" style=
=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif"> </span><sp=
an lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&=
#39;,serif">including figures and references using IEEE Computer Society
Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You c=
an
confirm the IEEE Computer Society Proceedings Author Guidelines at the
following web page: </span><span lang=3D"EN-GB"><a href=3D"http://www.compu=
ter.org/web/cs-cps/"><span style=3D"font-size:12pt;font-family:&#39;Times N=
ew Roman&#39;,serif">http://www.computer.org/web/cs-cps/</span></a></span><=
span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roma=
n&#39;,serif"></span></p>

<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"font-size:12pt;font-fa=
mily:&#39;Times New Roman&#39;,serif">Once accepted, the paper will be
included into the IEEE conference proceedings published by IEEE Computer
Society Press (indexed by EI). At least one of the authors of any accepted
paper is requested to register the paper at the conference.</span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span l=
ang=3D"EN-GB">=C2=A0</span></p>
</div>

--089e012291a2adba7a0512cb289e--


From nobody Fri Apr  3 15:59:14 2015
Return-Path: <granville@inf.ufrgs.br>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 067B61A86EE for <nmrg@ietfa.amsl.com>; Fri,  3 Apr 2015 15:59:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.062
X-Spam-Level: 
X-Spam-Status: No, score=-0.062 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, HELO_EQ_BR=0.955, HOST_EQ_BR=1.295, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R1Y1t82uD2vh for <nmrg@ietfa.amsl.com>; Fri,  3 Apr 2015 15:59:09 -0700 (PDT)
Received: from delivery2.ufrgs.br (delivery2.ufrgs.br [143.54.2.212]) by ietfa.amsl.com (Postfix) with ESMTP id 3B7EA1A86E6 for <nmrg@irtf.org>; Fri,  3 Apr 2015 15:59:09 -0700 (PDT)
Received: from delivery2.ufrgs.br (localhost [127.0.0.1]) by delivery2.ufrgs.br (Postfix) with ESMTP id 527AA20A0BA; Fri,  3 Apr 2015 19:59:05 -0300 (BRT)
Received: from msa1.ufrgs.br (msa1.ufrgs.br [143.54.2.208]) by delivery2.ufrgs.br (Postfix) with ESMTP id B5BD330010B; Fri,  3 Apr 2015 19:59:05 -0300 (BRT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
From: Lisandro Zambenedetti Granville <granville@inf.ufrgs.br>
In-Reply-To: <551D6EE3.9080300@concordia.ca>
Date: Fri, 3 Apr 2015 19:59:00 -0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <9DF3EFBB-BA99-49CA-8682-5E86EE6AE04F@inf.ufrgs.br>
References: <38C07DF4-AFAC-471A-8A11-0084A6C2627C@inf.ufrgs.br> <551D6EE3.9080300@concordia.ca>
To: William Atwood <william.atwood@concordia.ca>
X-Mailer: Apple Mail (2.2070.6)
X-AV-Checked: ClamAV using ClamSMTP
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/JJTHK6BBGQHcD9Z2cJyMZaAQ9MI>
Cc: nmrg@irtf.org
Subject: Re: [nmrg] 36th NMRG meeting - Call for Contributions
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2015 22:59:13 -0000

Dear William

Participants of the NMRG meeting don=E2=80=99t need to register for the =
meeting itself. Of course, if you are attending IM or other activities, =
you need to register for them.

Best regards,

Lisandro

> Em 02/04/2015, =C3=A0(s) 13:31, William Atwood =
<william.atwood@concordia.ca> escreveu:
>=20
> Olivier & Lisandro,
>=20
> A question about registration:
>=20
> The NMRG meeting appears to have the characteristics of a "Workshop",
> although it is not (yet) listed on the IM 2015 workshop page.
>=20
> I assume that participants in this NMRG meeting should register for =
the
> Friday "Workshop day", unless they are also attending the IM 2015
> sessions, in which case they should register for "Add to Reg
> TUTORIAL/WORKSHOP DAY".  Please confirm.
>=20
>  Bill
>=20
>=20
> On 02/04/2015 10:37 AM, Lisandro Zambenedetti Granville wrote:
>> Dear all,
>>=20
>> We are glad to announce that the 36th NMRG meeting will take
>> place in  Ottawa, May 15th 2015,  during IM 2015, as previously
>> mentioned in this mailing list. As planned from a previous
>> poll, this meeting will be focused on security aspects.
>>=20
>> Please, find below the Call for Contributions, and fell free
>> to distribute it to potential interested colleagues.
>>=20
>> Best regards,
>>=20
>> Olivier & Lisandro
>> NMRG Co-Chairs
>>=20
>>=20
>> ---
>>=20
>>=20
>>                  CALL FOR CONTRIBUTIONS
>>=20
>>      Managing Security Aspects of Internet Protocols
>>=20
>>   36th Network Management Research Group (NMRG) meeting
>>         IM 2015 - May 15th, 2015 =E2=80=93 Ottawa, Canada
>>=20
>>=20
>> Recently,  a  number   of  leaked  reports   describing  the
>> practices of countries tapping communication infrastructures
>> of other  nations  led  to  international  severe diplomatic
>> situations.  Security   flaws  have  been  of  interest  for
>> decades,  but they took another  dimension after the Snowden
>> case.  Internet  protocols  can present vulnerabilities that
>> allow  an   attacker   to  learn   and   exploit   sensitive
>> information; and users are often unaware of this situation.
>>=20
>> The 36th NMRG  meeting will be  centered on security aspects
>> of Internet  protocols that need to be properly managed. The
>> main goal  of the meeting  is to  bring together researchers
>> and practitioners on  the  field  to  discuss  key  security
>> management  requirements,  as  well  as  identify   priority
>> research  challenges  that  need  to be tackled.  Reports on
>> practical  experiences   on  security  aspects  of  Internet
>> protocols  are  of  special  interest.  Examples of research
>> questions include, but are not limited to:
>>=20
>> - How well is BCP38 (IP spoofing) implemented?
>> - How much worse is the amplification of DNSSEC?
>> - What is the behavior of botnets / DGAs?
>> - What privacy sensitive data is leaked from various
>>  protocols, without users awareness?
>>=20
>> This  36th  NMRG   meeting   will  be  co-located  with  the
>> IFIP/IEEE  International  Symposium  on  Integrated  Network
>> Management (IM 2015),  held in Ottawa,  Canada.  This  is an
>> important  opportunity  because  IM 2015 is a key conference
>> that  brings together  the network  and  services management
>> community.
>>=20
>> We  invite  interested  speakers  to  briefly describe their
>> potential  talks  informing title,  speaker name, and topic.
>> Contributions  should  be  submitted  via e-mail to the NMRG
>> mailing list (nmrg@irtf.org).
>>=20
>> Best regards,
>>=20
>> Olivier Festor & Lisandro Zambenedetti Granville
>> NMRG Co-Chair
>> _______________________________________________
>> nmrg mailing list
>> nmrg@irtf.org
>> https://www.irtf.org/mailman/listinfo/nmrg
>>=20
>=20
> --=20
> Dr. J.W. Atwood, Eng.             tel:   +1 (514) 848-2424 x3046
> Distinguished Professor Emeritus  fax:   +1 (514) 848-2830
> Department of Computer Science
>   and Software Engineering
> Concordia University EV 3.185     email:william.atwood@concordia.ca
> 1455 de Maisonneuve Blvd. West    http://users.encs.concordia.ca/~bill
> Montreal, Quebec Canada H3G 1M8
>=20
> _______________________________________________
> nmrg mailing list
> nmrg@irtf.org
> https://www.irtf.org/mailman/listinfo/nmrg


From nobody Sat Apr 11 12:25:17 2015
Return-Path: <lei.liu16@gmail.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1F9F1B2ADB for <nmrg@ietfa.amsl.com>; Fri, 10 Apr 2015 01:23:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.089
X-Spam-Level: 
X-Spam-Status: No, score=-0.089 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 67pKpy_V9Un0 for <nmrg@ietfa.amsl.com>; Fri, 10 Apr 2015 01:23:40 -0700 (PDT)
Received: from mail-ig0-x231.google.com (mail-ig0-x231.google.com [IPv6:2607:f8b0:4001:c05::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87C271B2ADA for <nmrg@irtf.org>; Fri, 10 Apr 2015 01:23:40 -0700 (PDT)
Received: by iggg4 with SMTP id g4so87290138igg.0 for <nmrg@irtf.org>; Fri, 10 Apr 2015 01:23:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:from:date:message-id:subject:to:content-type; bh=Pw2IWM1Vq+EclIscVcRyWvjwPIYOyoRV+05pih2PWvw=; b=rWmdHHs2d1C2zDqNeT1SKbdHT328ZHUR7u1waPKe1sfY7WoYpqYspMmHonpHhwG/Rj 5YwyPqnI9EK90xx8W1uQ+yTWs7szWCelM4O7k+GDi+fP029N0mjpRQqRsqJ2Ym3ACgRQ Zvem3CFpr5/MxWwgdHhr2KSCFlicVgxiDFTC8C6HNSJmjaWlA9rgFfdmDQCCeK9OjZ6a FisglOQrUOoH1fOGQbo5QMY0BgUrT6chrxONWdD+KJvsUmjdtv2WV846Uu6l9xKzaiV0 7qwKFuWFkuPGxfM5TosEhiAEVn9rmZFh0dPzo9bKveJuS1VZQ/zafY/IDwM5bMhB07xg HCZg==
X-Received: by 10.42.176.70 with SMTP id bd6mr1983515icb.52.1428654220008; Fri, 10 Apr 2015 01:23:40 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.64.101.162 with HTTP; Fri, 10 Apr 2015 01:23:19 -0700 (PDT)
From: "Lei Liu (Chris)" <lei.liu16@gmail.com>
Date: Fri, 10 Apr 2015 16:23:19 +0800
Message-ID: <CAEststkWbZWB4xL=oDT31r8Uwsxs_bwHg37NcQ=0b0QT+zxnVg@mail.gmail.com>
To: Lei Liu <lei.liu16@gmail.com>
Content-Type: multipart/alternative; boundary=90e6ba6e8f144a61ef05135a7b03
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/5zXpnYQ2dRpJDR3myPKJYF2TDEY>
X-Mailman-Approved-At: Sat, 11 Apr 2015 12:25:16 -0700
Subject: [nmrg] IEEE DASC-2015, Liverpool, England, UK, 26-28 Oct. 2015
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2015 08:23:47 -0000

--90e6ba6e8f144a61ef05135a7b03
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

[Please accept our apologies if you receive multiple copies of this email]

**************************** IEEE DASC-2015 CFP ***************************

*The 13th IEEE International Conference on Dependable, Autonomic and Secure
Computing*

*(DASC-2015)*

http://cse.stfx.ca/~dasc2015/

*Liverpool, England, UK, 26-28 October 2015 *

*Sponsored by*
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable
Computing (TCSC)

INTRODUCTION
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
As computer systems become increasingly large and complex, their
Dependability, Security and Autonomy play critical role at supporting
next-generation science, engineering, and commercial applications. These
systems consist of heterogeneous software/hardware/network components of
changing capaDASCies, availability, and in varied contexts. They provide
computing services to large pools of users and applications, and thus are
exposed to a number of dangers such as accidental/deliberate faults, virus
infections, malicious attacks, illegal intrusions, natural disasters, etc.
As a result, too often computer systems fail, become compromised, or
perform poorly and therefore untrustworthy. Thus, it remains a challenge to
design, analyse, evaluate, and improve the dependability and security for a
trusted computing environment. Trusted computing targets computing and
communication systems as well as services that are autonomous, dependable,
secure, privacy protect-able, predictable, traceable, controllable,
assessable and sustainable.

The scale and complexity of information systems evolve towards overwhelming
the capability of system administrators, programmers, and designers. This
calls for the autonomic computing paradigm, which meets the requirements of
self-management by providing self-optimization, self-healing,
self-configuration, and self-protection. As a promising means to implement
dependable and secure systems in a self-managing manner, autonomic
computing technology needs to be further explored. On the other hand, any
autonomic system must be trustworthy to avoid the risk of losing control
and retain confidence that the system will not fail. Trusted and autonomic
computing and communications need synergistic research efforts covering
many disciplines, ranging from computer science and engineering, to the
natural sciences and the social sciences. It requires scientific and
technological advances in a wide variety of fields, as well as new
software, system architectures, and communication systems that support the
effective and coherent integration of the constituent technologies.

DASC-2015 will be held on 26-28 October 2015 in Liverpool, UK. It aims to
bring together computer scientists, industrial engineers, and researchers
to discuss and exchange experimental and theoretical results, novel
designs, work-in-progress, experience, case studies, and trend-setting
ideas in the areas of dependability, security, trust and/or autonomic
computing systems.

SCOPE AND TPOCIS

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Topics of particular interests include the following tracks, but are not
limited to:

=C2=B7       Autonomic Computing Theory, Models, Architectures and Communic=
ations

=C2=B7       Cloud Computing with Autonomic and Trusted Environment

=C2=B7       Dependable Automatic Control Techniques and Systems

=C2=B7       Dependability Models and Evaluation Algorithms

=C2=B7       Dependable Sensors, Devices, Electronic-Mechanical Systems,
Optic-Electronic Systems, Embedded Systems

=C2=B7       Self-improvement in Dependable Systems

=C2=B7       Self-healing, Self-protection and Fault-tolerant Systems

=C2=B7       Hardware and Software Reliability, Verification and Testing

=C2=B7       Software Engineering for Dependable Systems

=C2=B7       vSafety-critical Systems in Transportation and Power System

=C2=B7       Security Models and Quantifications

=C2=B7       Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS

=C2=B7       Self-protection and Intrusion-detection in Security

=C2=B7       DRM, Watermarking Technology, IP Protection

=C2=B7       Context-aware Access Control

=C2=B7       Virus Detections and Anti-virus Techniques/Software

=C2=B7       Cyber Attack, Crime and Cyber War

=C2=B7       Human Interaction with Trusted and Autonomic Computing Systems

=C2=B7       Security, Dependability and Autonomic Issues in Ubiquitous Com=
puting

=C2=B7       QoS in Communications and Services

=C2=B7       Information and System Security

=C2=B7       Reliable Computing and Trusted Computing

=C2=B7       Wireless Emergency and Security Systems

=C2=B7       Information Technology in Biomedicine

=C2=B7       Multimedia Security Issues over Mobile and Wireless Networks

=C2=B7       Multimedia in Mobile Computing: Issues, System Design, and
Performance Evaluation

=C2=B7       Software Architectures and Design for Emerging Systems

=C2=B7       Software Engineering for Emerging Networks, Systems, and Mobil=
e
Systems

=C2=B7       Service Oriented Architectures

IMPORTANT DATES
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Workshop Proposal

30 April 2015

Submission Deadline:

15 June 2015

Authors Notification:

15 August 2015

Camera-ready Paper Due:

15 September 2015

Registration Due:

15 September 2015

Conference Date:

26-28 October 2015

PAPER SUBMISSION GUIDELINE
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D

All papers need to be submitted electronically through the conference
website (http://cse.stfx.ca/~dasc2015/sub/) with PDF format. The materials
presented in the papers should not be published or under submission
elsewhere. Each paper is limited to 8 pages (or 10 pages with over length
charge) including figures and references using IEEE Computer Society
Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You
can confirm the IEEE Computer Society Proceedings Author Guidelines at the
following web page: http://www.computer.org/web/cs-cps/
Once accepted, the paper will be included into the IEEE conference
proceedings published by IEEE Computer Society Press (indexed by EI). At
least one of the authors of any accepted paper is requested to register the
paper at the conference.

--90e6ba6e8f144a61ef05135a7b03
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><p class=3D"MsoNormal" align=3D"center" style=3D"text-alig=
n:center"><a name=3D"OLE_LINK1"><span lang=3D"EN-GB" style=3D"font-size:12p=
t;font-family:&#39;Times New Roman&#39;,serif;color:rgb(51,51,255)">[Please=
 accept our
apologies if you receive multiple copies of this email]</span></a><span lan=
g=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,s=
erif;color:rgb(51,51,255)"></span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span l=
ang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;=
,serif">****************************
IEEE DASC-2015 CFP ***************************</span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><b><spa=
n lang=3D"EN-GB" style=3D"font-size:10.5pt;font-family:&#39;Times New Roman=
&#39;,serif">The 13th IEEE International Conference on Dependable,
Autonomic and Secure Computing</span></b><span lang=3D"EN-GB" style=3D"font=
-size:10.5pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><b><spa=
n lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#=
39;,serif">(DASC-2015)</span></b><span lang=3D"EN-GB" style=3D"font-size:12=
pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span l=
ang=3D"EN-GB"><a href=3D"http://cse.stfx.ca/~dasc2015/"><span style=3D"font=
-size:12pt;font-family:&#39;Times New Roman&#39;,serif">http://cse.stfx.ca/=
~dasc2015/</span></a></span><span lang=3D"EN-GB" style=3D"font-size:12pt;fo=
nt-family:&#39;Times New Roman&#39;,serif"></span></p>

<p class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><b><spa=
n lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#=
39;,serif">Liverpool, England, UK, 26-28 October 2015 </span></b><span lang=
=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,se=
rif"></span></p>

<p class=3D"MsoNormal"><b><span lang=3D"EN-GB" style=3D"font-size:12pt;font=
-family:&#39;Times New Roman&#39;,serif">Sponsored by</span></b><span lang=
=3D"EN-GB" style=3D"font-size:11.5pt;font-family:&#39;Times New Roman&#39;,=
serif"><br>
IEEE, IEEE Computer Society and IEEE Technical Committee of Scalable Comput=
ing
(TCSC)</span></p>

<p class=3D"MsoNormal" style=3D"text-align:justify"><span lang=3D"EN-GB" st=
yle=3D"font-size:12pt;line-height:115%;font-family:&#39;Times New Roman&#39=
;,serif">INTRODUCTION<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
As computer systems become increasingly large and complex, their Dependabil=
ity,
Security and Autonomy play critical role at supporting next-generation scie=
nce,
engineering, and commercial applications. These systems consist of
heterogeneous software/hardware/network components of changing capaDASCies,
availability, and in varied contexts. They provide computing services to la=
rge
pools of users and applications, and thus are exposed to a number of danger=
s
such as accidental/deliberate faults, virus infections, malicious attacks,
illegal intrusions, natural disasters, etc. As a result, too often computer
systems fail, become compromised, or perform poorly and therefore
untrustworthy. Thus, it remains a challenge to design, analyse, evaluate, a=
nd
improve the dependability and security for a trusted computing environment.
Trusted computing targets computing and communication systems as well as
services that are autonomous, dependable, secure, privacy protect-able,
predictable, traceable, controllable, assessable and sustainable.</span></p=
>

<p class=3D"MsoNormal" style=3D"text-align:justify"><span lang=3D"EN-GB" st=
yle=3D"font-size:12pt;line-height:115%;font-family:&#39;Times New Roman&#39=
;,serif">The scale and complexity of
information systems evolve towards overwhelming the capability of system
administrators, programmers, and designers. This calls for the autonomic
computing paradigm, which meets the requirements of self-management by prov=
iding
self-optimization, self-healing, self-configuration, and self-protection. A=
s a
promising means to implement dependable and secure systems in a self-managi=
ng
manner, autonomic computing technology needs to be further explored. On the
other hand, any autonomic system must be trustworthy to avoid the risk of
losing control and retain confidence that the system will not fail. Trusted=
 and
autonomic computing and communications need synergistic research efforts
covering many disciplines, ranging from computer science and engineering, t=
o
the natural sciences and the social sciences. It requires scientific and
technological advances in a wide variety of fields, as well as new software=
,
system architectures, and communication systems that support the effective =
and
coherent integration of the constituent technologies.</span></p>

<p class=3D"MsoNormal" style=3D"text-align:justify"><span lang=3D"EN-GB" st=
yle=3D"font-size:12pt;line-height:115%;font-family:&#39;Times New Roman&#39=
;,serif">DASC-2015 will be held on 26-28
October 2015 in Liverpool, UK. It aims to bring together computer scientist=
s,
industrial engineers, and researchers to discuss and exchange experimental =
and
theoretical results, novel designs, work-in-progress, experience, case stud=
ies,
and trend-setting ideas in the areas of dependability, security, trust and/=
or
autonomic computing systems. </span><span lang=3D"EN-GB"></span></p>

<p class=3D""><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39=
;Times New Roman&#39;,serif">SCOPE AND
TPOCIS</span></p>

<p class=3D""><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39=
;Times New Roman&#39;,serif">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D</span></p>

<p><span lang=3D"EN-GB">Topics of particular interests include the followin=
g
tracks, but are not limited to: </span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Autonomic Computing Theory, Models,
Architectures and Communications</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Cloud Computing with Autonomic and
Trusted Environment</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Dependable Automatic Control
Techniques and Systems</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Dependability Models and Evaluation
Algorithms</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Dependable Sensors, Devices,
Electronic-Mechanical Systems, Optic-Electronic Systems, Embedded Systems</=
span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Self-improvement in Dependable
Systems</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Self-healing, Self-protection and
Fault-tolerant Systems</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Hardware and Software Reliability,
Verification and Testing</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Software Engineering for Dependable
Systems</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">vSafety-critical Systems in
Transportation and Power System</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Security Models and Quantifications</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Trusted P2P, Web Service, SoA, SaaS,
EaaS, and PaaS</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Self-protection and
Intrusion-detection in Security</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">DRM, Watermarking Technology, IP
Protection</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Context-aware Access Control</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Virus Detections and Anti-virus
Techniques/Software</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Cyber Attack, Crime and Cyber War</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Human Interaction with Trusted and
Autonomic Computing Systems</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Security, Dependability and
Autonomic Issues in Ubiquitous Computing</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">QoS in Communications and Services</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Information and System Security</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Reliable Computing and Trusted
Computing</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Wireless Emergency and Security
Systems</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Information Technology in
Biomedicine</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Multimedia Security Issues over
Mobile and Wireless Networks</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Multimedia in Mobile Computing:
Issues, System Design, and Performance Evaluation</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Software Architectures and Design
for Emerging Systems</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Software Engineering for Emerging
Networks, Systems, and Mobile Systems</span></p>

<p class=3D"" style><span lang=3D"EN-GB" style=3D"font-size:12pt;font-famil=
y:Symbol">=C2=B7<span style=3D"font-stretch:normal;font-size:7pt;font-famil=
y:&#39;Times New Roman&#39;">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 </span></=
span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times Ne=
w Roman&#39;,serif">Service Oriented Architectures</span></p>

<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"font-size:12pt;font-fa=
mily:&#39;Times New Roman&#39;,serif">IMPORTANT DATES<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</span></p>

<div align=3D"center">

<table class=3D"" border=3D"0" cellspacing=3D"3" cellpadding=3D"0" width=3D=
"100%" style=3D"width:100%">
 <tbody><tr>
  <td width=3D"30%" style=3D"width:30.7%;padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Wo=
rkshop Proposal</span></p>
  </td>
  <td width=3D"68%" style=3D"width:68.32%;padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">30 April 2015</span></p>
  </td>
 </tr>
 <tr>
  <td width=3D"30%" style=3D"width:30.7%;padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Su=
bmission Deadline:</span></p>
  </td>
  <td width=3D"68%" style=3D"width:68.32%;padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">15 June 2015</span><span lang=3D"EN-GB" style=3D"font-size:12pt;f=
ont-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
 <tr>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Au=
thors Notification:</span></p>
  </td>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">15 August 2015</span><span lang=3D"EN-GB" style=3D"font-size:12pt=
;font-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
 <tr>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Ca=
mera-ready Paper Due:</span></p>
  </td>
  <td style=3D"padding:0.75pt;background-image:initial;background-repeat:in=
itial">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">15 September 2015</span><span lang=3D"EN-GB" style=3D"font-size:1=
2pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
 <tr>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Re=
gistration Due:</span></p>
  </td>
  <td style=3D"padding:0.75pt;background-image:initial;background-repeat:in=
itial">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">15 September 2015</span><span lang=3D"EN-GB" style=3D"font-size:1=
2pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
 <tr>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">Co=
nference Date:</span></p>
  </td>
  <td style=3D"padding:0.75pt">
  <p class=3D"MsoNormal" style=3D"margin-bottom:0.0001pt"><span lang=3D"EN-=
GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif;col=
or:black">26-28 October 2015</span><span lang=3D"EN-GB" style=3D"font-size:=
12pt;font-family:&#39;Times New Roman&#39;,serif"></span></p>
  </td>
 </tr>
</tbody></table>

</div>

<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"font-size:12pt;font-fa=
mily:&#39;Times New Roman&#39;,serif">PAPER SUBMISSION GUIDELINE<br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D</span></p>

<p class=3D"MsoNormal" style=3D"text-align:justify"><span lang=3D"EN-GB" st=
yle=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif">All pape=
rs need to be submitted
electronically through the conference website (</span><span lang=3D"EN-GB">=
<a href=3D"http://cse.stfx.ca/~dasc2015/sub/"><span style=3D"font-size:12pt=
;font-family:&#39;Times New Roman&#39;,serif">http://cse.stfx.ca/~dasc2015/=
sub/</span></a></span><span lang=3D"EN-GB" style=3D"font-size:12pt;font-fam=
ily:&#39;Times New Roman&#39;,serif">) with PDF format. The materials
presented in the papers should not be published or under submission elsewhe=
re. Each
paper is limited to 8 pages </span><span lang=3D"EN-US" style=3D"color:blac=
k">(or 10 pages with over length charge)</span><span lang=3D"EN-US" style=
=3D"font-size:12pt;font-family:&#39;Times New Roman&#39;,serif"> </span><sp=
an lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roman&=
#39;,serif">including figures and references using IEEE Computer Society
Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You c=
an
confirm the IEEE Computer Society Proceedings Author Guidelines at the
following web page: </span><span lang=3D"EN-GB"><a href=3D"http://www.compu=
ter.org/web/cs-cps/"><span style=3D"font-size:12pt;font-family:&#39;Times N=
ew Roman&#39;,serif">http://www.computer.org/web/cs-cps/</span></a></span><=
span lang=3D"EN-GB" style=3D"font-size:12pt;font-family:&#39;Times New Roma=
n&#39;,serif"></span></p>

<span lang=3D"EN-GB" style=3D"font-size:12pt;line-height:115%;font-family:&=
#39;Times New Roman&#39;,serif">Once accepted, the paper will be included i=
nto
the IEEE conference proceedings published by IEEE Computer Society Press
(indexed by EI). At least one of the authors of any accepted paper is reque=
sted
to register the paper at the conference.</span><br>
</div>

--90e6ba6e8f144a61ef05135a7b03--


From nobody Wed Apr 29 23:34:18 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A71FA1ACDA3; Wed, 29 Apr 2015 23:34:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t_vlZaCi_S_O; Wed, 29 Apr 2015 23:34:15 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 345AC1ACD55; Wed, 29 Apr 2015 23:34:15 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.0.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150430063415.30893.39397.idtracker@ietfa.amsl.com>
Date: Wed, 29 Apr 2015 23:34:15 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/0W2rdzVCOkqUuc9rZ6JF5ky0bzE>
Cc: nmrg@irtf.org
Subject: [nmrg] I-D Action: draft-irtf-nmrg-location-ipfix-03.txt
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Apr 2015 06:34:16 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Network Management Working Group of the IETF.

        Title           : Extending IP Flow-Based Network Monitoring with Location Information
        Authors         : Olivier Festor
                          Abdelkader Lahmadi
                          Rick Hofstede
                          Aiko Pras
	Filename        : draft-irtf-nmrg-location-ipfix-03.txt
	Pages           : 22
	Date            : 2015-04-29

Abstract:
   IP Flow-based monitoring lacks a mechanism to associate measured IP
   Flow information with the geographic location of the device where the
   IP Flows have been observed. This document defines a set of
   guidelines and best practices to extend IP Flow monitoring protocols
   with location information of the device (both fixed and mobile) that
   acts as an IP Flow metering process.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-irtf-nmrg-location-ipfix/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-irtf-nmrg-location-ipfix-03

A diff from the previous version is available at:
https:https://www.ietf.org/rfcdiff?url2=draft-irtf-nmrg-location-ipfix-03


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Apr 30 13:09:57 2015
Return-Path: <internet-drafts@ietf.org>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 286331ACDFD; Thu, 30 Apr 2015 13:09:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mw_WqwKcj26s; Thu, 30 Apr 2015 13:09:52 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F77D1A0181; Thu, 30 Apr 2015 13:09:52 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.0.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150430200952.18034.49330.idtracker@ietfa.amsl.com>
Date: Thu, 30 Apr 2015 13:09:52 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/E0UwGvcXFxTf4A6doi2YF-rKYh8>
Cc: nmrg@irtf.org
Subject: [nmrg] I-D Action: draft-irtf-nmrg-an-gap-analysis-06.txt
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Apr 2015 20:09:54 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Network Management Working Group of the IETF.

        Title           : General Gap Analysis for Autonomic Networking
        Authors         : Sheng Jiang
                          Brian Carpenter
                          Michael H. Behringer
	Filename        : draft-irtf-nmrg-an-gap-analysis-06.txt
	Pages           : 17
	Date            : 2015-04-30

Abstract:
   This document is a product of the IRTF's Network Management Research
   Group.  It provides a problem statement and general gap analysis for
   an IP-based Autonomic Network that is mainly based on distributed
   network devices.  The document provides a background by reviewing the
   current status of autonomic aspects of IP networks and the extent to
   which current network management depends on centralisation and human
   administrators.  Finally the document outlines the general features
   missing from current network abilities that are needed in the ideal
   Autonomic Network concept.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-irtf-nmrg-an-gap-analysis/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-irtf-nmrg-an-gap-analysis-06

A diff from the previous version is available at:
https:https://www.ietf.org/rfcdiff?url2=draft-irtf-nmrg-an-gap-analysis-06


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Apr 30 13:13:01 2015
Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 146F21ACDFD for <nmrg@ietfa.amsl.com>; Thu, 30 Apr 2015 13:13:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fi_2Qif-lOzB for <nmrg@ietfa.amsl.com>; Thu, 30 Apr 2015 13:12:58 -0700 (PDT)
Received: from mail-pa0-x231.google.com (mail-pa0-x231.google.com [IPv6:2607:f8b0:400e:c03::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58D9E1ACD87 for <nmrg@irtf.org>; Thu, 30 Apr 2015 13:12:58 -0700 (PDT)
Received: by pabtp1 with SMTP id tp1so69857565pab.2 for <nmrg@irtf.org>; Thu, 30 Apr 2015 13:12:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:organization:user-agent:mime-version:to :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=gT6TtECWiEKitCZ7fFAWGlnMvjaXSVeNbElfwGT+HkQ=; b=jkj3d6IcWGzPcJiLyZuHWpoZg0EXWTRwVCn2V9VWM4X6tg0QY5UQTMgOO9KLvZ4rsJ Y+dOTdnESFbhYQZt8pFVjvKObV+o5NjCyUQSG62srIMbMlckLus8fs4b4XhZsShAbuoX 1E7nG8cvXDJep0zjN/ymQ5EKy7hlDLRQ/EjDG6waQF8qm+LDq0U5KBCdz8w34QkqMkDP c/zrl8cCX7t6pHYjrTBkKbVcohbjSZb7TLFnh08mOilF2HRTNN7nROWYEhXuHvhbO/fn znBtOlpx5ngmK1y1ya1m9Y/LnZRFJBi5PGMaJt3i5vipYS8PRLE0dP1MZt1lHVGM2LgI +6kg==
X-Received: by 10.70.136.169 with SMTP id qb9mr11546731pdb.46.1430424778034; Thu, 30 Apr 2015 13:12:58 -0700 (PDT)
Received: from ?IPv6:2406:e007:502b:1:28cc:dc4c:9703:6781? ([2406:e007:502b:1:28cc:dc4c:9703:6781]) by mx.google.com with ESMTPSA id gy1sm2957794pbc.55.2015.04.30.13.12.55 for <nmrg@irtf.org> (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 30 Apr 2015 13:12:56 -0700 (PDT)
Message-ID: <55428CCE.10508@gmail.com>
Date: Fri, 01 May 2015 08:13:02 +1200
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: nmrg@irtf.org
References: <20150430200952.18034.49330.idtracker@ietfa.amsl.com>
In-Reply-To: <20150430200952.18034.49330.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/mZ31s6BxVvA8Cf0vs0VpNqCoJtM>
Subject: Re: [nmrg] I-D Action: draft-irtf-nmrg-an-gap-analysis-06.txt
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Apr 2015 20:13:00 -0000

This update was to add a few words required by the RFC Editor; no technical change.

   Brian

On 01/05/2015 08:09, internet-drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>  This draft is a work item of the Network Management Working Group of the IETF.
> 
>         Title           : General Gap Analysis for Autonomic Networking
>         Authors         : Sheng Jiang
>                           Brian Carpenter
>                           Michael H. Behringer
> 	Filename        : draft-irtf-nmrg-an-gap-analysis-06.txt
> 	Pages           : 17
> 	Date            : 2015-04-30
> 
> Abstract:
>    This document is a product of the IRTF's Network Management Research
>    Group.  It provides a problem statement and general gap analysis for
>    an IP-based Autonomic Network that is mainly based on distributed
>    network devices.  The document provides a background by reviewing the
>    current status of autonomic aspects of IP networks and the extent to
>    which current network management depends on centralisation and human
>    administrators.  Finally the document outlines the general features
>    missing from current network abilities that are needed in the ideal
>    Autonomic Network concept.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-irtf-nmrg-an-gap-analysis/
> 
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-irtf-nmrg-an-gap-analysis-06
> 
> A diff from the previous version is available at:
> https:https://www.ietf.org/rfcdiff?url2=draft-irtf-nmrg-an-gap-analysis-06
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
> 

