posted by organizer: jarir || 6520 views || tracked by 6 users: [display]

POLICE 2014 : The Second International Workshop on Security Policies in Cloud Environment (PoliCE’2014)

FacebookTwitterLinkedInGoogle

Link: http://www.netys.net/police2014/
 
When May 14, 2014 - May 14, 2014
Where Marrakech, Morocco
Submission Deadline Apr 2, 2014
Notification Due Apr 28, 2014
Final Version Due May 2, 2014
Categories    cloud security   security policies   cloud computing   security
 

Call For Papers

Cloud Computing is already becoming an emerging platform for both the industrial and scientific community, that include service-oriented architecture and virtualizations of hardware and software as the technical foundations. While Cloud Computing has a number of benefits, there are also a number of security concerns, which need to be resolved, due to the nature of the Cloud.

This workshop will focus on different facets of cloud computing security policies. Among these facets, many aspects need to be addressed including: security policies requirements, formalization of security policies, security policies management, security policies deployments, security policies languages, security policies composition, security policies refinement, security policies life-cycle, cross-domain policies coordination and negotiation, architectures of policy-based management systems.

Researchers and practitioners all over the world, from both academia and industry, working in the areas of cloud computing, security policies, domain specific languages, formal techniques, and service-oriented computing are invited to discuss state of the art solutions, novel issues, recent developments, applications, methodologies, techniques, experience reports, and tools for the development and use of security policies in the Cloud.

We invite the submission of original work that is related to the topics below. The papers should not exceed 6 pages using IEEE format.

Topics of interest include, but are not limited to, the following:

- Security policies requirements
- Security policies languages
- Security policies composition
- Security policies refinement and conformance
- Formalization of security policies
- Security policies management
- Security policies deployments
- Security policies life-cycle
- Cross-domain policies coordination and negotiation
- Architectures of policy-based management systems
- Security policies and Service Level Agreements

Paper Submission

We invite the submission of original work that is related to the topics below. Authors are invited to submit full papers up to 6 pages using IEEE format.

Dates

Full Paper submission: April 2, 2014
Acceptance notification: April 28, 2014
Camera-ready copy due: May 2, 2014
Workshop day: May 14, 2014.

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
SYSTOR 2018   11th ACM International Systems and Storage Conference
FiCloud 2018   The IEEE 6th International Conference on Future Internet of Things and Cloud
SIGI 2017   3rd International Conference on Signal and Image Processing
HCIS TI CFPs 2018   Call for Papers Thematic Issue of HCIS-Springer (indexed by SCIE)
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
CLOUD 2018   The 11th International Conference on Cloud Computing
ICMLC - Ei 2018   2018 10th International Conference on Machine Learning and Computing (ICMLC 2018)--ACM, Ei Compendex and Scopus
IJE 2017   International Journal of Education (IJE)
ICCAI 2018--ACM, Ei, Scopus 2018   ACM--2018 International Conference on Computing and Artificial Intelligence (ICCAI 2018)--Ei Compendex and Scopus