Organizing Committee

Carol Fung
Virginia Commonwealth University, USA

Mohamed Faten Zhani
École de Technologie Supérieure, Canada

Weverton Cordeiro
Federal Institute of Pará @ Itaituba, Brazil

Technical Program Committee

Marinho Barcellos, Federal University of Rio Grande do Sul, Brazil

Weverton Cordeiro, Federal Institute of Pará @ Itaituba, Brazil

Yehia Elkhatib, Lancaster University, United Kingdom

Carol Fung, Virginia Commonwealth University, USA

Luciano Gaspary, Federal University of Rio Grande do Sul, Brazil

Amer Hassam, Microsoft, USA

Mohamed Ali Kaafar, NICTA, Australia

Farouk Kamoun, École Nationale des Sciences de l'Informatique, Tunisia

Ming Li, Utah State University

Barbara Martini, CNIT, Italy

Giovane Moura, Delft University of Technology, The Netherlands

Flávio Santos, Chaordic Systems, Brazil

Zhongzhi Luan, Beihang University, China

Jiahai Yang, Tsinghua University, China

Qi Zhang, University of Toronto, Canada

Mohamed Faten Zhani, École de Technologie Supérieure, Canada

Quanyan Zhu, New York University, USA



1ST IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)

Co-located with IEEE/IFIP IM 2015
Ottawa, Canada


DISSECT 2015 Keynote (back to main page)

Security Challenges in the eye of the Hurricane: Navigating the perfect networking storm of Virtualization, Mobility, and IoT

09:30 - 10:30

View the slides

Chris Ullock
Security Expert and Senior Product Manager, Nakina Systems

Abstract: The business challenges faced by communication service providers are well known. Specifically, revenues remain threatened by increasing competition from more agile competitors. As a result, service providers are turning to new technologies, such as Network Function Virtualization (NFV), to enable both new service innovations and to reduce costs. In order to realize the full commercial benefits, identifying and overcoming some of the practical and critical operational considerations will be required. Security is one of the most critical considerations, which must not be an afterthought. Identity Access Management strategies must accommodate a variety of network equipment, multiple generations of technologies and scale to support hundreds of thousands of equipment types, including virtual infrastructure, virtual network functions, servers and systems.

Biography: Chris Ullock has over 15 years of experience in OSS and Telecom and has worked in a variety of roles over the years in network operations, project management and product management. Currently, Chris is part of the Nakina product management team with responsibility in the areas of Security and Fulfillment.


Date and Location

Ottawa, Canada, 15th May 2015

Held in conjunction with IEEE/IFIP International Symposium on Integrated Network Management (IM) Ottawa, Canada.


To be held at the Ottawa Convention Center. Further information on workshop venue, accommodation, travel, and more is available on the IM 2015 website http://im2015.ieee-im.org

Important Dates

15th Dec 2014 12th Jan 2015 Paper Submission Deadline (EXTENDED)

30th Jan 2015 Acceptance Notification

15th Feb 2015 Camera-Ready Papers

15th May 2015 Workshop Day

Paper Submission

Paper submissions must present original, unpublished research or experiences. Papers under review elsewhere must not be submitted to the workshop.

All contributions must be submitted in PDF format via JEMS https://submissoes.sbc.org.br/dissect2015.

The submission and acceptance of contributions will be subject to a rigorous peer review process to ensure originality, timeliness, relevance, and readability.

Paper Format

All papers must be limited to 6 pages in an IEEE 2-column style and will be subject to a peer-review process.

The accepted papers will be submitted for publication in the IEEE Xplore Digital Library. Papers will be withdrawn from IEEE Xplore in case the authors do not present their paper at the workshop.