posted by user: nashwaelbendary || 8694 views || tracked by 12 users: [display]

CCSP 2012 : Special Session on Cloud Computing: A Security Perspective

FacebookTwitterLinkedInGoogle

Link: http://egyptscience.net/AMLTA12/files/SS-8.pdf
 
When Dec 8, 2012 - Dec 10, 2012
Where Cairo, Egypt
Submission Deadline Jul 31, 2012
Notification Due Aug 15, 2012
Final Version Due Sep 15, 2012
Categories    cloud computing   security   privacy   trust
 

Call For Papers

Call for papers
===================================================================
Special Session on Cloud Computing: A Security Perspective (CCSP'12)

Under the framework of the International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2012)
will be held on December 8-10, 2012 in Cairo, Egypt.
http://www.egyptscience.net/AMLTA12/
===========================================


========================
= General Information =
========================
Cloud computing is one of the fast emerging fields in computing science and technology, which will have a major impact on the quality of science and research as well as human daily life over the coming years. It is a new concept based on the great achievements in computer hardware technologies, such as hardware virtualization, multi-core chips; distributed computing technologies, such as utility computing and grid computing; Internet technologies, such as SOA, Web 2.0, web services, mashups; and computer system management technologies, such as, autonomic computing and data center automation. Recently, great attentions in computation research, education, and business communities have been attracted by the concept of Cloud computing. Moreover, cloud Computing is considered as a way to centralize computation set up, implementation, maintenance, and management then to provide integrated computation to end user or business as services. The typical Cloud Computing paradigm is XaaS, such as the three foundational services, Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).
Despite the fact that cloud Computing has the huge potential in changing the way of computation and provides tremendous research and commercial opportunities, it also creates the great challenges in IT infrastructure, IT and information security, computation policy, industry regulation, and computation management, governance, and legislation due to the fact that clouds still subject to traditional data confidentiality, integrity, availability, and privacy issues, with addition to some other attacks.
Accordingly, to seize the opportunities and to solve the challenging issues have become the great motivation in Cloud Computing education, research, and commercialization. The purpose of this session is to provide a scientific forum gathering people from academia, research, and industry for discussing the most emerging issues, recent advances, and future challenges in the area of security and privacy of cloud computing.


======================
= Topics of Interest =
======================

Topics of interest include, but are not limited to:

· Cloud-delivered security services
· Cryptographic protocols for cloud security
· Secure data management outsourcing
· Privacy and integrity mechanisms for outsourcing
· Cloud-centric threat/attack/vulnerability models
· Secure computation outsourcing
· Trust and policy management in clouds
· Trusted cloud computing technologies
· Secure identity management
· Business clouds and security risk models
· Cost and usability models for security in clouds
· Scalability of security in global-size clouds
· Network security mechanisms for cloud contexts
· Security for emerging cloud programming models
· Energy/cost/efficiency of security in clouds
· Cloud wireless sensor networks
· Web 2.0, SaaS, IaaS, and PaaS cloud related security issues


=========================
= Submission Guidelines =
=========================

Authors are invited to submit original research contributions not concurrently submitted elsewhere (Submission system). Normal length papers
should be between 8 and 10 pages, formatted in Springer’s single column format (detailed instructions for submissions are given below).
Short papers should be between 5 and 7 pages.
Submitted papers will be refereed by at least three reviewers for quality, correctness, originality, and relevance. Notification and reviews
will be communicated via email.
Papers reporting original research results and experience are solicited. Each paper, written in English, should be no more than 8 pages
in the LNCS Springer style, including references and illustrations. E-submissions in PDF format are strongly recommended.
Web Submission:
http://www.easychair.org/conferences/conference_change_yes

All accepted conference papers will be presented at the conference and included in the published proceedings
by Springer's CCIS (Communications in Computer and Information Science) Series and indexed by SCOUPS and EI.

Please follow the instructions on Springer's LNCS webpage http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0 when
formatting to ensure that your paper is included in the proceedings
(the word template can be found on the right side as a download link word.zip).


===================
= Important Dates =
===================

Paper Submission Deadline: July 31,2012
Acceptance Notification: August 15,2012
Camera-Ready Submission Deadline: September 15,2012
Registration Deadline: September 15,2012

======================
= Session Organizers =
======================

*Nashwa El-Bendary
Arab Academy for Science, Technology & Maritime Transport
Cairo, Egypt
nashwa.elbendary@ieee.org
nashwa.elbendary@egyptscience.net


*Qing Tan
Athabasca University, School of Computing and Information Systems
Canada
qingt@athabascau.ca


*Jinn-Shing Cheng
National Kaohsiung First University of Science and Technology,
Dept. of Information Management
Taiwan
jscheng@nkfust.edu.tw


*Aboul Ella Hassanien
Cairo University
Faculty of Computers and Information
Cairo, Egypt
Abo@egyptscience.net

==================================================================
==================================================================

Related Resources

ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CTISC 2024   2024 6th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2024) -EI Compendex
ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
ADMIT 2024   2024 3rd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2024)
CSW 2024   2024 3rd International Conference on Cyber Security
UCC 2024   The IEEE/ACM International Conference on Utility and Cloud Computing
EPEAI 2024   The Economic Perspective on AI