posted by system || 5184 views || tracked by 4 users: [display]

C&TC 2020 : C&TC 2020 goes online. Conference on Security, Trust, Cloud, IoT [October 2020]

FacebookTwitterLinkedInGoogle

Link: http://www.otmconferences.org
 
When Oct 25, 2020 - Oct 27, 2020
Where Online
Submission Deadline TBD
Categories    security   cloud   trust   IOT
 

Call For Papers


*** Due to unforseen circumstances, C&TC 2020 (part of OTM Conferences) is cancelled for 2020. We will miss you in 2020 but hope to see you in in 2021! ***


==========================================================================
CALL FOR PAPERS
Cloud and Trusted Computing (C&TC 2020)
http://www.otmconferences.org
==========================================================================



===========
Description
===========

Today's software systems cover a very wide range of application domains, technologies, and research issues. This has been realized through Cloud Computing, Big Data, and IoT. Security, privacy, trust, and risk management are vital elements in such information systems. Cloud and Trusted Computing (C&TC 2020) is organized as part of the OnTheMove Federated Conferences & Workshops that will be held exclusively online.

The conference solicits submissions from both academia and industry presenting novel research in Security, Trust, Privacy, Cloud Computing, Data Analytics, IoT, and related topics. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. We also welcome review papers that analyze critically the current status of trust, security, privacy and risk management in the Cloud, Big Data, and IoT. Papers from practitioners who encounter security, privacy, trust, and risk management problems are also welcome.


===========
Topics
===========

Topics of interest are classified in four main themes and include, but are not limited to:

TRUST, SECURITY, PRIVACY AND RISK MANAGEMENT
- Assurance Techniques
- Access Control, Authorization, and Authentication
- Anonymization techniques
- Big data security and privacy
- Blockchain
- Cloud Computing with Autonomic and Trusted Environment
- Cooperative systems
- Cryptographic Algorithms and Protocols
- Cyber Attack, Crime and Cyber War
- DRM, Watermarking Technology, IP Protection
- Emergency and Security Systems
- End-to-end security over complex cloud supply chain
- Forensics
- Human Interaction with Trusted and Autonomic Computing Systems
- Identity and Trust Management
- Information analytics for Cyber-physical systems security
- IoT security and privacy
- Multimedia Security Issues over Mobile and Wireless Clouds
- Network Security
- Networks of Trust, Clouds of Trust
- Privacy, Anonymity
- Privilege Management Infrastructure
- Reliable Computing and Trusted Computing
- Risk evaluation and Management
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- Security Models and Quantifications
- Self-protection and Intrusion-detection in Security
- Semantics in cybersecurity
- Trust Evaluation and Prediction in Service-Oriented Environments
- Trust, Security, Privacy and Confidentiality
- Trust in big data analytics
- Trust in IoT environments
- Trusted Cloud-Edges computations
- Trusted Computing in virtualized environments
- Trusted Execution Environments
- Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS
- Virus Detections and Anti-virus Techniques/Software

DATA MANAGEMENT
- Algorithms and Computations on Encrypted Data
- Big Data, Frameworks and Systems for Parallel and Distributed Computing
- Big Data Processing and Analytics
- Big Data Preparation
- Big Data Representation
- Big Data Visualization- Database as a Service, Multi-tenancy, Data management and analytics as a service
- Data Analytics for Security
- Data Provenance
- Data Integrity
- Data Science and Scalable Machine Learning
- Elasticity and Scalability for Cloud Data Management Systems
- Encryption Systems for IoT Data
- High Availability and Reliability
- Interoperability between Clouds- New Protocols, Interfaces and Data Models for Cloud Databases
- Resource and Workload Management in Cloud Databases
- Sensor-Based Data Collection, Management, and Security
- Security Informatics for Big Data environments
- Service Level Agreements and Contracts
- Transactional Models for Cloud Databases, Consistency and Replication
- Threats and countermeasures
- Virtualization and Cloud databases, Storage Structures and Indexing

INFRASTRUCTURES AND ARCHITECTURES
- Autonomic Computing Theory, Models, Architectures and Communications
- Big Data Infrastructures
- Cloud Resource provisioning with QoS Guarantees
- Cloud Operation and Resource Management
- Cloud Performance Modeling and Benchmarks
- Datacenter Architecture and Management
- Formal methods and Tools for Cloud computing
- Infrastructures for Social Computing and Networking
- IoT Infrastructures
- NoSQL Databases
- Software Architectures and Design for Trusted Emerging Systems
- Virtualized Computing Infrastructures

APPLICATIONS
- Big Data Applications and Case Studies
- Cloud Business Applications and Case Studies
- Clouds and Social Media, Network and Link Analysis
- Data Intensive Applications
- IoT Applications and Case Studies
- Large Scale Cloud Applications, Reality Mining
- Mobile Cloud Services
- New Parallel / Concurrent Programming Models for Cloud Computing
- Pervasive / Ubiquitous Computing in the Cloud
- Reliability, Fault Tolerance, Quality-of-Service
- Service Level Agreements and Performance Measurement
- Service-Oriented Architectures, RESTful Services in Cloud Environments



================
Paper Submission
================

FULL PAPERS
Regular paper submissions to Cloud and Trusted Computing (C&TC 2020) must present original research in one or more of the themes given above. Full papers must break new ground, present new insight, deliver a significant research contribution and provide validated support via results and conclusions. Each paper must be submitted as a single PDF file in Springer Lecture Notes in Computer Science format (no longer than 18 pages in length). Accepted regular papers will be included in the conference main proceedings and presented in the paper sessions. Submissions to C&TC 2020 must not be under review by any other conference or publication at any time during the C&TC review cycle, and must not be previously published or accepted for publication elsewhere.

SHORT PAPERS
Short papers (no longer than 8 pages in length) must report new results and provide support for the results, as a novel and valuable contribution to the field. Short papers must be submitted as single PDF file in Springer Lecture Notes in Computer Science format. Accepted short papers will be published in the conference main proceedings and will be presented in the online paper sessions of the conference.

Paper submission site: https://easychair.org/conferences/?conf=otm2020

PAPER FORMATTING AND PRESENTING
The paper and notes submission site giving all the relevant submission details is located at: http://www.otmconferences.org/index.php/paper-submission/authors-kit. Failure to comply with the formatting instructions for submitted papers or notes will lead to the outright rejection of the paper without review. Failure to commit to the online presentation at the conference automatically excludes a paper from the proceedings.

===============
Program Chairs
===============

- George Karabatis, University of Maryland, Baltimore County (UMBC), USA
- Adrian Belmonte, ENISA, EU

Related Resources

JICT STD 2023   Special Issue on Cloud Native Security for 5G, 5G-A and 6G
WorldCIS 2022   World Congress on Internet Security
IoT special issue 2022   Call for papers on the Special Issue titled Sustainability Privacy-Preserving of IoT-Based Application in Smart Healthcare
ACIE--EI 2023   2023 The 3rd Asia Conference on Information Engineering (ACIE 2023)
ICISSP 2023   9th International Conference on Information Systems Security and Privacy
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IEEE ICCCBDA 2023   IEEE--2023 the 8th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2023)
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
NordSec 2022   The 27th Nordic Conference on Secure IT Systems