posted by user: akiyama || 35273 views || tracked by 5 users: [display]

MidCCI 2015 : MidCCI 2015: 1st IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking

FacebookTwitterLinkedInGoogle

Link: http://www.computer.org/web/compsac/midcci
 
When Jul 1, 2015 - Jul 5, 2015
Where Taichung, Taiwan
Submission Deadline Mar 18, 2015
Notification Due Apr 10, 2015
Final Version Due Apr 24, 2015
Categories    middleware   cloud computing   cyber security   grid computing
 

Call For Papers

MidCCI 2015: 1st IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking
In Conjunction with COMPSAC 2015,
Taichung, Taiwan - July 1-5, 2015


MidCCI aims to share experiences of developing and managing middleware from both technical and policy aspects. It aims to bring together application developers and middleware and security experts to identify areas of overlap and best practice so that the development of solutions can be simple and ideally modular in nature, to ensure applications can be developed quickly and easily whilst conforming to middleware and security standards.

This workshop started as the Middleware Architecture in the Internet (MidArch) workshop in 2007. After holding the 8th workshop, co-located with COMPSAC 2014, it was decided to change the workshop name as Middleware for Cyber Security, Cloud Computing and Internetworking (MidCCI), considering the change in situation surrounding Internet middleware. This workshop carries over the aims from the past MidArch workshops.

Middleware is a layer of software that acts as glue between applications and the Internet. Although it is somehow difficult to define what middleware is (see RFC2768), it provides fundamental services in various situations, such as authentication, authorization, accounting, directories, resource management, information discovery and retrieval, and security. Middleware solutions are starting to mature with a number of frameworks emerging that should ideally make use of common reusable components and tools to deliver specific middleware services for communities such as researchers in GRID/cloud communities, and teaching and learning in higher education.

In addition to technical and policy aspects of middleware development and management, papers on system development and experiences are also welcome. When such a paper is submitted, please include "Implementation" or "Experiences" in the keyword list of the paper.


- The scope of MidCCI includes but is not limited to:

Authentication, authorization, accounting and access management
Single sign on for Web services and non-web applications
Federations & trust fabrics (technologies and policies)
Wireless network roaming architectures
DNS and directory services
Hypervisor (VMware, Xen, KVM, ...)
Academic cloud
Cloud computing platform (OpenStack, CloudStack, ...)
Frameworks for distributed processing (Hadoop, Jubatus, ...)
Middleware for SDN and NFV (Open vSwitch, OpenFlow Controllers, ...)
Middleware for Information-Centric Networking
Middleware for overlay networking
Network simulators and emulators
Secure computing
Countermeasures against Advanced Attacks
E-mail digital signature and encryption (S/MIME, PGP, etc.)
PKI deployment issues
Security policies
Big data/Cloud/GRID access control and privacy protection
Implementation/Experiences of middleware.


Authors are invited to submit original, unpublished research papers as well as industrial practice papers. Simultaneous submissions to other publications and conferences are not permitted.

The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts.

Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.


- Workshop Organizers:
Hideaki Goto, Associate Professor, Tohoku University, Japan
Shuo-Yan Chou, Professor, National Taiwan University of Science and
Technology, Taiwan
Toyokazu Akiyama, Associate Professor, Kyoto Sangyo University, Japan


- Program Committee:
Atsushi Kanai (Hosei University, Japan)
Diego R. Lopez (Telefonica I+D, Spain)
Guido Aben (AARNet, Australia)
Hideaki Goto (Tohoku University, Japan)
Hideaki Sone (Tohoku University, Japan)
Hiroyuki Sato (The University of Tokyo, Japan)
Jiann-Liang Chen (National Taiwan University of Science and Technology, Taiwan)
Kento Aida (National Institute of Infomatics, Japan)
Mikael Linden (CSC, Finland)
Motonori Nakamura (National Institute of Informatics, Japan)
Muhammad Farhan Sjaugi (Perdana University, Malaysia)
Nariyoshi Yamai (Tokyo University of Agriculture and Technology, Japan)
Shigeaki Tanimoto (Chiba Institute of Technology, Japan)
Shoji Kajita (Kyoto University, Japan)
Shuo-Yan Chou (National Taiwan University of Science and Technology, Taiwan)
Stefan Winter (RESTENA, Luxembourg)
Suhaimi Napis (Universiti Putra Malaysia, Malaysia)
Toru Kobayashi (Nagasaki University, Japan)
Toyokazu Akiyama (Kyoto Sangyo University, Japan)
Yasuo Okabe (Kyoto University, Japan)
Yoshiaki Seki (Tokyo City University, Japan)

Related Resources

SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
ICDIS 2020   The 3rd International Conference on Data Intelligence and Security
SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
IEEE-CTISC 2020   2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2020)
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
BIGML 2020   International conference on Big Data, Machine learning and Applications
CyberSA 2020   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
ISDFS 2020   8th International Symposium on Digital Forensics and Security
IEEE OJ-COMS 2020   Special Issue on Cyber Forensics for Emerging Technologies, IEEE Open Journal of the Communications Society