posted by user: jkawamoto || 3255 views || tracked by 4 users: [display]

PriSecCSN 2013 : The 2nd International Symposium on Privacy and Security in Cloud and Social Networks

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/prisec2013/
 
When Sep 30, 2013 - Sep 30, 2013
Where Karlsruhe, Germany
Submission Deadline Jun 25, 2013
Notification Due Jul 15, 2013
Final Version Due Aug 12, 2013
Categories    privacy   security   social network
 

Call For Papers

Call for papers: The 2nd International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2013), 30 September, 2013, Karlsruhe, Germany.

The website is: https://sites.google.com/site/prisec2013/

Important dates:
Deadline for Paper Submission: June 25, 2013
Notification of Acceptance: July 15, 2013
Camera Ready Copies: August 12, 2013

Submission site and requirements:
https://www.easychair.org/conferences/?conf=priseccsn2013

Please submit your paper(s) in PDF file. Papers should be limited up to 8 pages in IEEE CS format. The template files for LATEX or WORD can be downloaded from the symposium website. All papers will be peer reviewed by two or three pc members. Submitting a paper to the symposium means that if the paper is accepted, at least one author should register to CGC2013 and attend the conference to present the paper.

Publications:
All accepted papers will appear in the proceedings published by IEEE Computer Society (EI indexed). Selected papers will be invited to special issues of CGC2013 in:

Concurrency and Computing: Practice and Experience
Journal of Network and Computer Applications
Personal and Ubiquitious Computing
Journal of Systems and Software

Introduction:
Social network analysis and cloud computing are two of the most exciting new trends in the recent developments of information technology. As the new generation computing paradigm, cloud enables computing resources to be provided as IT services in a pay-as-you-go fashion with high efficiency and effectiveness. With the popularity of social software as well as the fast development of cloud and other high-performance computing infrastructures, the outcome of social network analysis is becoming more and more attractive. However, information privacy and security issues are major challenges in both these areas. This symposium aims at providing a forum for researchers, practitioners and developers from different background areas such as distributed computing, social computing, information security and privacy protection areas to exchange the latest experience, research ideas and synergic research and development on fundamental issues and applications about security and privacy issu!
es in cloud environments and social networks. The symposium solicits high quality research results in all related areas.

Topics:
The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The symposium solicits novel papers on a broad range of topics, including but not limited to:

Security and privacy in Big Data management
Application of modern cryptography in cloud and social networks
Emerging threats in cloud-based services
Multi-tenancy related security/privacy issues
Secure virtualisation mechanisms
Vulnerabilities in cloud infrastructure
Vulnerabilities in MapReduce
Security modelling and threats in cloud computing
Security/privacy in hybrid cloud
Auditing in cloud computing
Access control in cloud computing
Secure Job deployment and scheduling
Secure resource allocation and indexing
User authentication in cloud services
Practical privacy and integrity mechanisms for data outsourcing
Foundations of cloud-centric threat models
Information hiding
Trust and policy management in cloud
Secure identity management mechanisms
Security/privacy/trust issues in SaaS/PaaS/IaaS
Business and security risk models
Cost and usability models related security issues in clouds
Security for emerging cloud programming models
Remote data integrity protection
Securing distributed data storage in the cloud
Data-centric security and data classification
Security and privacy in mobile cloud
Intrusion detection/prevention
Malware propagation in social networks
Information leakage via social networks
Social currency mechanisms - potential and risks
Privacy management in social networks - access controls, permissions
Identity theft in social networks
Collaborative detection of distributed network attacks
Peer-to-peer based security mechanisms
Trust and reputation in social networks
Socially inspired network security architectures
Socially aware network security protocols
Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.)
Configuring security protocol parameters based on social information
Privacy-preserving methods for data access and data mining
Domain Security
Privacy Requirements Engineering
Private Information Retrieval
Privacy and Security in Personal Health Records
Online Social Footprints
Secure Multi-party Computation
Privacy Mechanisms in Services
Pseudonymity and Anonymity Modelling
Software Security Engineering
Integrity Verification
Trust Development in Collaboration Teams
Usable Privacy Design
Privacy Aware Access Control Model
Multi-Faceted Privacy Preservation
Access Control and RBAC Policies

General Chairs:

Philip S. Yu, University of Illinois at Chicago, USA
Kui Ren, University at Buffalo, State University of New York

Program Chairs:

Chang Liu, University of Technology, Sydney, Australia
Rajiv Ranjan, CSIRO, Australia
Jinjun Chen, University of Technology, Sydney, Australia

Program Committee:

Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Cristina Alcaraz, University of Malaga, Spain
Ahmed M. Azab, North Carolina State University, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Shiping Chen, CSIRO ICT Centre, Australia
Rui Chen, Hong Kong Baptist University, Hong Kong
Yingying (Jennifer) Chen, Stevens Institute of Technology, USA
Frederic Cuppens, Telecom Bretagne, France
Geeth R De mel, IBM, USA
Yves-Alexandre De Montjoye, MIT, USA
Rino Falcone, National Research Council, Italy
Carmen Fernandez-Gago, University of Malaga, Spain
Debasis Giri, Haldia Institute of Technology, India
Kartik Gopalan, SUNY – Binghamton, USA
Ching-Hsien Hsu, Chung Hua University, Taiwan
Meiko Jensen, Ruhr University Bochum, Germany
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Muthucumaru Maheswaran, McGill University, Canada
David Naccache, ENS, France
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Neeli R. Prasad, Aalborg University, Denmark
Rami Puzis, Ben Gurion University, Israel
Jean-Jacques Quisquater, UCL, Belgium
Silvio Ranise, Fondazione Bruno Kessler, Italy
Karen Renaud, University of Glasgow, Scotland
Jean-Marc Seigneur, University of Geneva, Switzerland
Ketil Stolen, University of Oslo, Norway
Sotirios Terzis, University of Strathclyde, UK
Bharadwaj Veeravalli, The National University of Singapore
Guilin Wang, University of Wollongong, Australia
Hua Wang, University of Southern Queensland, Australia
Ke Wang, Simon Fraser University, Burnaby
Yang Xiang, Deakin University, Australia
Jie Zhang, Nanyang Technological University, Singapore


Any inquiries, please direct to Chang Liu at changliu.it@gmail.com.

Related Resources

Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
IJCSITY 2017   International Journal of Computational Science and Information Technology
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems
CIP in RS&OSN 2018   Computational Intelligence Paradigms in Recommender Systems and Online Social Networks
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
SMDAP_WN 2017   Special Collection on Security Mechanisms and Data Access Protocols in Innovative Wireless Networks - IJDSN (IF: 0.906)