posted by user: jarir || 5490 views || tracked by 8 users: [display]

POLICE 2013 : The First International Workshop on Security Policies in Cloud Environment (PoliCE’2013)

FacebookTwitterLinkedInGoogle

Link: http://www.netys.net/police2013/
 
When May 2, 2013 - May 2, 2013
Where Marrakech, Morocco
Submission Deadline Mar 22, 2013
Notification Due Apr 5, 2013
Final Version Due Apr 15, 2013
Categories    cloud security   security policies   cloud computing   security
 

Call For Papers

Cloud Computing is already becoming an emerging platform for both the industrial and scientific community, that include service-oriented architecture and virtualizations of hardware and software as the technical foundations. While Cloud Computing has a number of benefits, there are also a number of security concerns, which need to be resolved, due to the nature of the Cloud.

This workshop will focus on different facets of cloud computing security policies. Among these facets, many aspects need to be addressed including: security policies requirements, formalization of security policies, security policies management, security policies deployments, security policies languages, security policies composition, security policies refinement, security policies life-cycle, cross-domain policies coordination and negotiation, architectures of policy-based management systems.

Researchers and practitioners all over the world, from both academia and industry, working in the areas of cloud computing, security policies, domain specific languages, formal techniques, and service-oriented computing are invited to discuss state of the art solutions, novel issues, recent developments, applications, methodologies, techniques, experience reports, and tools for the development and use of security policies in the Cloud.

We invite the submission of original work that is related to the topics below. The papers should not exceed 6 pages using IEEE format.

Topics of interest include, but are not limited to, the following:

- Security policies requirements

- Security policies languages

- Security policies composition

- Security policies refinement and conformance

- Formalization of security policies

- Security policies management

- Security policies deployments

- Security policies life-cycle

- Cross-domain policies coordination and negotiation

- Architectures of policy-based management systems

- Security policies and Service Level Agreements

Paper Submission

We invite the submission of original work that is related to the topics below. Authors are invited to submit full papers up to 6 pages using IEEE format.

Dates

Full Paper submission: March 22, 2013 (Hard).
Acceptance notification: April 5, 2013.
Camera-ready copy due: April 15, 2013.
Workshop day: May 2, 2013.


Related Resources

IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ICSS 2019   5th International Conference on Software Security
SP 2020   IEEE Symposium on Security and Privacy
IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
CCGRID 2020   20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
SeTM 2019   Security and Trust in Mobile Network 2019
EI-ICBICC 2020   2020 2nd International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2020)
IJBBR 2019   International Journal of BRIC Business Research
Cyber Security 2020   IEEE International Conference on Cyber Security and Protection of Digital Services