posted by system || 6749 views || tracked by 13 users: [display]

PriSecCSN 2012 : The 2012 International Symposium on Privacy and Security in Cloud and Social Networks

FacebookTwitterLinkedInGoogle

Link: http://www.swinflow.org/confs/prisec2012
 
When Nov 1, 2012 - Nov 3, 2012
Where Xiangtan, China
Submission Deadline Jun 25, 2012
Categories    privacy   security   cloud   social networks
 

Call For Papers

The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The symposium solicits novel papers on a broad range of topics, including but not limited to:

Security and privacy in Big Data management
Application of modern cryptography in cloud and social networks
Emerging threats in cloud-based services
Multi-tenancy related security/privacy issues
Secure virtualisation mechanisms
Vulnerabilities in cloud infrastructure
Vulnerabilities in MapReduce
Security modelling and threats in cloud computing
Security/privacy in hybrid cloud
Auditing in cloud computing
Access control in cloud computing
Secure Job deployment and scheduling
Secure resource allocation and indexing
User authentication in cloud services
Practical privacy and integrity mechanisms for data outsourcing
Foundations of cloud-centric threat models
Information hiding
Trust and policy management in cloud
Secure identity management mechanisms
Security/privacy/trust issues in SaaS/PaaS/IaaS
Business and security risk models
Cost and usability models related security issues in clouds
Security for emerging cloud programming models
Remote data integrity protection
Securing distributed data storage in the cloud
Data-centric security and data classification
Security and privacy in mobile cloud
Intrusion detection/prevention
Malware propagation in social networks
Information leakage via social networks
Social currency mechanisms - potential and risks
Privacy management in social networks - access controls, permissions
Identity theft in social networks
Collaborative detection of distributed network attacks
Peer-to-peer based security mechanisms
Trust and reputation in social networks
Socially inspired network security architectures
Socially aware network security protocols
Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.)
Configuring security protocol parameters based on social information
Privacy-preserving methods for data access and data mining
Domain Security
Privacy Requirements Engineering
Private Information Retrieval
Privacy and Security in Personal Health Records
Online Social Footprints
Secure Multi-party Computation
Privacy Mechanisms in Services
Pseudonymity and Anonymity Modelling
Software Security Engineering
Integrity Verification
Trust Development in Collaboration Teams
Usable Privacy Design
Privacy Aware Access Control Model
Multi-Faceted Privacy Preservation
Access Control and RBAC Policies

Related Resources

CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
ICNCC 2022   2022 The 11th International Conference on Networks, Communication and Computing (ICNCC 2022)
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
EAI SecureComm 2022   18th EAI International Conference on Security and Privacy in Communication Networks
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IEEE Edge_AI Conn_Health 2022   The IEEE GLOBECOM 2022 Workshop on the Edge-AI and IoT for Connected Health
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
TrustCom 2022   The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI