posted by user: nashwaelbendary || 8224 views || tracked by 12 users: [display]

CCSP 2012 : Special Session on Cloud Computing: A Security Perspective

FacebookTwitterLinkedInGoogle

Link: http://egyptscience.net/AMLTA12/files/SS-8.pdf
 
When Dec 8, 2012 - Dec 10, 2012
Where Cairo, Egypt
Submission Deadline Jul 31, 2012
Notification Due Aug 15, 2012
Final Version Due Sep 15, 2012
Categories    cloud computing   security   privacy   trust
 

Call For Papers

Call for papers
===================================================================
Special Session on Cloud Computing: A Security Perspective (CCSP'12)

Under the framework of the International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2012)
will be held on December 8-10, 2012 in Cairo, Egypt.
http://www.egyptscience.net/AMLTA12/
===========================================


========================
= General Information =
========================
Cloud computing is one of the fast emerging fields in computing science and technology, which will have a major impact on the quality of science and research as well as human daily life over the coming years. It is a new concept based on the great achievements in computer hardware technologies, such as hardware virtualization, multi-core chips; distributed computing technologies, such as utility computing and grid computing; Internet technologies, such as SOA, Web 2.0, web services, mashups; and computer system management technologies, such as, autonomic computing and data center automation. Recently, great attentions in computation research, education, and business communities have been attracted by the concept of Cloud computing. Moreover, cloud Computing is considered as a way to centralize computation set up, implementation, maintenance, and management then to provide integrated computation to end user or business as services. The typical Cloud Computing paradigm is XaaS, such as the three foundational services, Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).
Despite the fact that cloud Computing has the huge potential in changing the way of computation and provides tremendous research and commercial opportunities, it also creates the great challenges in IT infrastructure, IT and information security, computation policy, industry regulation, and computation management, governance, and legislation due to the fact that clouds still subject to traditional data confidentiality, integrity, availability, and privacy issues, with addition to some other attacks.
Accordingly, to seize the opportunities and to solve the challenging issues have become the great motivation in Cloud Computing education, research, and commercialization. The purpose of this session is to provide a scientific forum gathering people from academia, research, and industry for discussing the most emerging issues, recent advances, and future challenges in the area of security and privacy of cloud computing.


======================
= Topics of Interest =
======================

Topics of interest include, but are not limited to:

· Cloud-delivered security services
· Cryptographic protocols for cloud security
· Secure data management outsourcing
· Privacy and integrity mechanisms for outsourcing
· Cloud-centric threat/attack/vulnerability models
· Secure computation outsourcing
· Trust and policy management in clouds
· Trusted cloud computing technologies
· Secure identity management
· Business clouds and security risk models
· Cost and usability models for security in clouds
· Scalability of security in global-size clouds
· Network security mechanisms for cloud contexts
· Security for emerging cloud programming models
· Energy/cost/efficiency of security in clouds
· Cloud wireless sensor networks
· Web 2.0, SaaS, IaaS, and PaaS cloud related security issues


=========================
= Submission Guidelines =
=========================

Authors are invited to submit original research contributions not concurrently submitted elsewhere (Submission system). Normal length papers
should be between 8 and 10 pages, formatted in Springer’s single column format (detailed instructions for submissions are given below).
Short papers should be between 5 and 7 pages.
Submitted papers will be refereed by at least three reviewers for quality, correctness, originality, and relevance. Notification and reviews
will be communicated via email.
Papers reporting original research results and experience are solicited. Each paper, written in English, should be no more than 8 pages
in the LNCS Springer style, including references and illustrations. E-submissions in PDF format are strongly recommended.
Web Submission:
http://www.easychair.org/conferences/conference_change_yes

All accepted conference papers will be presented at the conference and included in the published proceedings
by Springer's CCIS (Communications in Computer and Information Science) Series and indexed by SCOUPS and EI.

Please follow the instructions on Springer's LNCS webpage http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0 when
formatting to ensure that your paper is included in the proceedings
(the word template can be found on the right side as a download link word.zip).


===================
= Important Dates =
===================

Paper Submission Deadline: July 31,2012
Acceptance Notification: August 15,2012
Camera-Ready Submission Deadline: September 15,2012
Registration Deadline: September 15,2012

======================
= Session Organizers =
======================

*Nashwa El-Bendary
Arab Academy for Science, Technology & Maritime Transport
Cairo, Egypt
nashwa.elbendary@ieee.org
nashwa.elbendary@egyptscience.net


*Qing Tan
Athabasca University, School of Computing and Information Systems
Canada
qingt@athabascau.ca


*Jinn-Shing Cheng
National Kaohsiung First University of Science and Technology,
Dept. of Information Management
Taiwan
jscheng@nkfust.edu.tw


*Aboul Ella Hassanien
Cairo University
Faculty of Computers and Information
Cairo, Egypt
Abo@egyptscience.net

==================================================================
==================================================================

Related Resources

STDRR 2021   Special Session on Smart Technology for Disaster Recovery and Resilience
IEEE COINS 2021   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
JEDT 2021   International Journal of Electronic Design and Test
AICCC--EI, Scopus 2021   2021 4th Artificial Intelligence and Cloud Computing Conference (AICCC 2021)--EI Compendex, Scopus
IJCIS 2021   International Journal on Cryptography and Information Security
CCNC 2021   IEEE Consumer Communications & Networking Conference
SoCC 2021   Symposium on Cloud Computing
IJACEEE 2021   International Journal of Applied Control, Electrical and Electronics Engineering
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges