posted by system || 10255 views || tracked by 18 users: [display]

CCSW 2012 : The ACM Cloud Computing Security Workshop

FacebookTwitterLinkedInGoogle

Link: http://crypto.cs.stonybrook.edu/ccsw12/
 
When Oct 19, 2012 - Oct 19, 2012
Where Sheraton Raleigh Hotel, Raleigh, NC
Submission Deadline Jul 16, 2012
Notification Due Aug 13, 2012
Final Version Due Aug 24, 2012
 

Call For Papers

Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:
-practical cryptographic protocols for cloud security
-secure cloud resource virtualization mechanisms
-secure data management outsourcing (e.g., database as a service)
-practical privacy and integrity mechanisms for outsourcing
-foundations of cloud-centric threat models
-secure computation outsourcing
-remote attestation mechanisms in clouds
-sandboxing and VM-based enforcements
-trust and policy management in clouds
-secure identity management mechanisms
-new cloud-aware web service security paradigms and mechanisms
-cloud-centric regulatory compliance issues and mechanisms
-business and security risk models and clouds
-cost and usability models and their interaction with security in clouds
-scalability of security in global-size clouds
-trusted computing technology and clouds
-binary analysis of software for remote attestation and cloud protection
-network security (DOS, IDS etc.) mechanisms for cloud contexts
-security for emerging cloud programming models
-energy/cost/efficiency of security in clouds

We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
ICDLT--ACM, Ei, Scopus 2022   ACM--2022 6th International Conference on Deep Learning Technologies (ICDLT 2022)--Ei Compendex, Scopus
IEEE COINS 2022   International Conference on Omni-Layer Intelligent Systems Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Se
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
HPCCT--ACM, EI, Scopus 2022   ACM--2022 6th High Performance Computing and Cluster Technologies Conference (HPCCT 2022)--EI Compendex, Scopus
ACM--ICDLT--Ei, Scopus 2022   ACM--2022 6th International Conference on Deep Learning Technologies (ICDLT 2022)--Ei Compendex, Scopus
MDPI Network SI AECC 2022   MDPI Network - Special Issue on Advances in Edge and Cloud Computing
ICIVC--IEEE, Ei, Scopus 2022   IEEE--2022 7th International Conference on Image, Vision and Computing (ICIVC 2022)--Ei Compendex, Scopus
EAI BCBE 2022   EAI International Conference on Block chain, cloud computing and big data with education