CCSP 2012 : Special Session on Cloud Computing: A Security Perspective
Call For Papers
Call for papers
Special Session on Cloud Computing: A Security Perspective (CCSP'12)
Under the framework of the International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2012)
will be held on December 8-10, 2012 in Cairo, Egypt.
= General Information =
Cloud computing is one of the fast emerging fields in computing science and technology, which will have a major impact on the quality of science and research as well as human daily life over the coming years. It is a new concept based on the great achievements in computer hardware technologies, such as hardware virtualization, multi-core chips; distributed computing technologies, such as utility computing and grid computing; Internet technologies, such as SOA, Web 2.0, web services, mashups; and computer system management technologies, such as, autonomic computing and data center automation. Recently, great attentions in computation research, education, and business communities have been attracted by the concept of Cloud computing. Moreover, cloud Computing is considered as a way to centralize computation set up, implementation, maintenance, and management then to provide integrated computation to end user or business as services. The typical Cloud Computing paradigm is XaaS, such as the three foundational services, Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).
Despite the fact that cloud Computing has the huge potential in changing the way of computation and provides tremendous research and commercial opportunities, it also creates the great challenges in IT infrastructure, IT and information security, computation policy, industry regulation, and computation management, governance, and legislation due to the fact that clouds still subject to traditional data confidentiality, integrity, availability, and privacy issues, with addition to some other attacks.
Accordingly, to seize the opportunities and to solve the challenging issues have become the great motivation in Cloud Computing education, research, and commercialization. The purpose of this session is to provide a scientific forum gathering people from academia, research, and industry for discussing the most emerging issues, recent advances, and future challenges in the area of security and privacy of cloud computing.
= Topics of Interest =
Topics of interest include, but are not limited to:
· Cloud-delivered security services
· Cryptographic protocols for cloud security
· Secure data management outsourcing
· Privacy and integrity mechanisms for outsourcing
· Cloud-centric threat/attack/vulnerability models
· Secure computation outsourcing
· Trust and policy management in clouds
· Trusted cloud computing technologies
· Secure identity management
· Business clouds and security risk models
· Cost and usability models for security in clouds
· Scalability of security in global-size clouds
· Network security mechanisms for cloud contexts
· Security for emerging cloud programming models
· Energy/cost/efficiency of security in clouds
· Cloud wireless sensor networks
· Web 2.0, SaaS, IaaS, and PaaS cloud related security issues
= Submission Guidelines =
Authors are invited to submit original research contributions not concurrently submitted elsewhere (Submission system). Normal length papers
should be between 8 and 10 pages, formatted in Springer’s single column format (detailed instructions for submissions are given below).
Short papers should be between 5 and 7 pages.
Submitted papers will be refereed by at least three reviewers for quality, correctness, originality, and relevance. Notification and reviews
will be communicated via email.
Papers reporting original research results and experience are solicited. Each paper, written in English, should be no more than 8 pages
in the LNCS Springer style, including references and illustrations. E-submissions in PDF format are strongly recommended.
All accepted conference papers will be presented at the conference and included in the published proceedings
by Springer's CCIS (Communications in Computer and Information Science) Series and indexed by SCOUPS and EI.
Please follow the instructions on Springer's LNCS webpage http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0 when
formatting to ensure that your paper is included in the proceedings
(the word template can be found on the right side as a download link word.zip).
= Important Dates =
Paper Submission Deadline: July 31,2012
Acceptance Notification: August 15,2012
Camera-Ready Submission Deadline: September 15,2012
Registration Deadline: September 15,2012
= Session Organizers =
Arab Academy for Science, Technology & Maritime Transport
Athabasca University, School of Computing and Information Systems
National Kaohsiung First University of Science and Technology,
Dept. of Information Management
*Aboul Ella Hassanien
Faculty of Computers and Information