posted by system || 4028 views || tracked by 1 users: [display]

CSAW 2014 : Second International Workshop On Cloud Security Auditing

FacebookTwitterLinkedInGoogle

Link: http://www.csaworkshop.org
 
When Jun 27, 2014 - Jul 2, 2014
Where Anchorage, Alaska, USA
Submission Deadline Mar 29, 2014
Categories    security
 

Call For Papers

Building on the success of the first workshop and its alignment within the IEEE World Congress on Services, the Cloud Security Auditing Workshop provides a unique setting for the exchange of research and development practices for the detection, prevention, mitigation,and reporting of security attacks. The concepts surrounding security auditing cover issues related to cloud architectures, tenant services and resources, service interactions, privacy, and standards, where meta-information must be captured, shared, and monitored across the cloud.

The workshop solicits original papers on increasing cloud resiliency and trustworthiness through security auditing as applied to various cloud models, layers, services, resources, and application domains. Though not limited to these topics, contributions can address issues such as cloud mashing, technologies for capturing security relevant events, service level agreements, session management, languages and protocols, real-time analysis, streaming and manipulation of big cloud data, and information assurance standards application. The workshop also welcomes survey papers and practitioner experiences.

Topics of interest to CSAW 2014 include, but are not limited to:

List of Topics

Cloud mashing security issues

Languages and protocols for specifying, composing, analyzing, and sharing security-relevant, distributed logs of audit data from a cloud-wide perspective

Cloud security, threat modeling, and analysis, including centralized/distributed attack detection and prediction/prevention algorithms based on audited information

Automated tools for capturing, integrating, and analyzing cloud audit data

Algorithms and protocols for audit data stream delivery, manipulation, and analysis for big cloud audit data

Access control and information flow control models for disclosure and modification of sensitive cloud audit data

Methods for expressing and representing the cloud infrastructure and configuration to influence logging and monitoring processes

Information assurance (authenticity, integrity, confidentiality and availability) of cloud audit data, including security and privacy policies and compliance with security controls such as NIST sp800-53 and Cloud Security Alliance guidance 3.0

Service-level agreements that formalize and guarantee logging and analysis capabilities

Session management, tracking, and alerting of vulnerabilities and threats

Related Resources

ICDPA 2025   2025 The 11th International Conference on Data Processing and Applications (ICDPA 2025)
WWW 2025   The Web Conference
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Springer CCCN 2025   Springer--2025 The 3rd International Conference on Cloud Computing and Computer Network (CCCN 2025)
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
CTCM 2024   10th International Conference of Control Theory and Computer Modelling