posted by user: akiyama || 27751 views || tracked by 5 users: [display]

MidCCI 2015 : MidCCI 2015: 1st IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking


When Jul 1, 2015 - Jul 5, 2015
Where Taichung, Taiwan
Submission Deadline Apr 2, 2015
Notification Due Apr 21, 2015
Final Version Due Apr 30, 2015
Categories    middleware   cloud computing   cyber security   grid computing

Call For Papers

MidCCI 2015: 1st IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking
In Conjunction with COMPSAC 2015,
Taichung, Taiwan - July 1-5, 2015

MidCCI aims to share experiences of developing and managing middleware from both technical and policy aspects. It aims to bring together application developers and middleware and security experts to identify areas of overlap and best practice so that the development of solutions can be simple and ideally modular in nature, to ensure applications can be developed quickly and easily whilst conforming to middleware and security standards.

This workshop started as the Middleware Architecture in the Internet (MidArch) workshop in 2007. After holding the 8th workshop, co-located with COMPSAC 2014, it was decided to change the workshop name as Middleware for Cyber Security, Cloud Computing and Internetworking (MidCCI), considering the change in situation surrounding Internet middleware. This workshop carries over the aims from the past MidArch workshops.

Middleware is a layer of software that acts as glue between applications and the Internet. Although it is somehow difficult to define what middleware is (see RFC2768), it provides fundamental services in various situations, such as authentication, authorization, accounting, directories, resource management, information discovery and retrieval, and security. Middleware solutions are starting to mature with a number of frameworks emerging that should ideally make use of common reusable components and tools to deliver specific middleware services for communities such as researchers in GRID/cloud communities, and teaching and learning in higher education.

In addition to technical and policy aspects of middleware development and management, papers on system development and experiences are also welcome. When such a paper is submitted, please include "Implementation" or "Experiences" in the keyword list of the paper.

- The scope of MidCCI includes but is not limited to:

Authentication, authorization, accounting and access management
Single sign on for Web services and non-web applications
Federations & trust fabrics (technologies and policies)
Wireless network roaming architectures
DNS and directory services
Hypervisor (VMware, Xen, KVM, ...)
Academic cloud
Cloud computing platform (OpenStack, CloudStack, ...)
Frameworks for distributed processing (Hadoop, Jubatus, ...)
Middleware for SDN and NFV (Open vSwitch, OpenFlow Controllers, ...)
Middleware for Information-Centric Networking
Middleware for overlay networking
Network simulators and emulators
Secure computing
Countermeasures against Advanced Attacks
E-mail digital signature and encryption (S/MIME, PGP, etc.)
PKI deployment issues
Security policies
Big data/Cloud/GRID access control and privacy protection
Implementation/Experiences of middleware.

Authors are invited to submit original, unpublished research papers as well as industrial practice papers. Simultaneous submissions to other publications and conferences are not permitted.

The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts.

Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.

- Workshop Organizers:
Hideaki Goto, Associate Professor, Tohoku University, Japan
Shuo-Yan Chou, Professor, National Taiwan University of Science and
Technology, Taiwan
Toyokazu Akiyama, Associate Professor, Kyoto Sangyo University, Japan

- Program Committee:
Atsushi Kanai (Hosei University, Japan)
Diego R. Lopez (Telefonica I+D, Spain)
Guido Aben (AARNet, Australia)
Hideaki Goto (Tohoku University, Japan)
Hideaki Sone (Tohoku University, Japan)
Hiroyuki Sato (The University of Tokyo, Japan)
Jiann-Liang Chen (National Taiwan University of Science and Technology, Taiwan)
Kento Aida (National Institute of Infomatics, Japan)
Mikael Linden (CSC, Finland)
Motonori Nakamura (National Institute of Informatics, Japan)
Muhammad Farhan Sjaugi (Perdana University, Malaysia)
Nariyoshi Yamai (Tokyo University of Agriculture and Technology, Japan)
Shigeaki Tanimoto (Chiba Institute of Technology, Japan)
Shoji Kajita (Kyoto University, Japan)
Shuo-Yan Chou (National Taiwan University of Science and Technology, Taiwan)
Stefan Winter (RESTENA, Luxembourg)
Suhaimi Napis (Universiti Putra Malaysia, Malaysia)
Toru Kobayashi (Nagasaki University, Japan)
Toyokazu Akiyama (Kyoto Sangyo University, Japan)
Yasuo Okabe (Kyoto University, Japan)
Yoshiaki Seki (Tokyo City University, Japan)

Related Resources

Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
SIGI 2017   3rd International Conference on Signal and Image Processing
CyberSA 2018   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment
CCGrid 2018   IEEE International Symposium on Cluster Computing and the Grid
Cyber Incident 2018   IEEE International Conference on Cyber Incident Response, Coordination, Containment & Control
ADCOM 2017   3rd International conference on Advanced Computing
Middleware 2017   International Middleware Conference
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
ICMLC - Ei 2018   2018 10th International Conference on Machine Learning and Computing (ICMLC 2018)--ACM, Ei Compendex and Scopus
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications