posted by user: javaboom || 4553 views || tracked by 4 users: [display]

TSCloud 2015 : The 5th IEEE International Symposium on Trust and Security in Cloud Computing

FacebookTwitterLinkedInGoogle

Link: https://research.comnet.aalto.fi/Trustcom2015/tscloud2015/
 
When Aug 20, 2015 - Aug 22, 2015
Where Helsinki, Finland
Submission Deadline May 1, 2015
Notification Due Jun 1, 2015
Final Version Due Jul 1, 2015
Categories    cloud security   security   cryptography   cloud computing
 

Call For Papers

The IEEE TSCloud 2015 Symposium brings together researchers with an interest in theoretical foundations and practical approaches to trust and security in cloud computing. The emphasis is on high-impact, novel/adopted theories and paradigms that address mathematical and logical underpinnings in trust and security in cloud computing, e.g. encryption, obfuscation, virtualisation security, governance, accountability, etc. Following the success of the first four TSCloud symposiums in Changsha, Liverpool, Melbourne and Beijing, this year’s TSCloud will focus on “New Challenges in Cloud Computing Security, Privacy and Trust”. As cloud computing matures and experiences increased adoption, the security of both data and infrastructures increases in importance. We invite researchers and practitioners to submit their novel ideas, interesting innovation or even surveys on important cloud security and trust topics

* Scope and Interests

Topics of interest for both main and demo tracks include, but are not limited to:

Malware detection in cloud computing
Cryptography and encryption techniques for cloud computing
Data obfuscation for cloud computing
Accountability in cloud computing
Identity management in cloud computing
Account and Domain management in cloud computing
Security in virtualized environments
Governance, regulation and compliance in cloud computing
Data analytics for security in cloud computing
Visualization for security in cloud computing
Cloud computing threat detection techniques
Trust in cloud services
Trust reputation systems for cloud computing
Reports on critical, real-life security and trust use cases in cloud computing
Secure and trusted workflows in cloud computing
Techniques preventing the nefarious use of cloud computing
Cloud data leakage and data loss
Position papers on issues in security and trust in cloud computing


* Paper Submission Guidelines

Papers submitted to the symposium should be written in English conforming to the IEEE Conference Proceedings Format (8.5" x 11", Two-Column). The paper should be submitted through the symposium submission system at the symposium website. The length of the papers should not exceed 6 pages + 2 pages for over length charges.

Accepted and presented papers will be included into the IEEE Conference Proceedings published by IEEE CS CPS and submitted to IEEE Xplore and CSDL. Authors of accepted papers, or at least one of them, are requested to register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE CS after the conference. Distinguished papers presented at the conference, after further revision, will be recommended to special issues of reputable SCI/EI-indexed journals.

Submitting a paper to the symposium means that, if the paper is accepted, at least one author should attend the symposium and present the paper.

* Important Dates

Submission deadline: May 1st, 2015
Authors notification: June 1st, 2015
Camera-ready due: July 1st, 2015
Registration: July 1st, 2015

* Program Chairs

Ryan Ko, University of Waikato, New Zealand
Kim-Kwang Raymond Choo, University of South Australia, Australia

* Technical Programme Committee

Alex Aravind, University of Northern British Columbia, Canada
Abir Awad, Irish Centre for Cloud Computing and Commerce, AIT, Ireland
Sivadon Chaisiri, University of Waikato, New Zealand
Aloysius Cheang, Cloud Security Alliance, Asia Pacific
Kim-Kwang Raymond Choo, University of South Australia, Australia
Ali Dehghantanha, University of Salford, United Kingdom
Ryan Ko, University of Waikato, New Zealand
Laurie Lau, Asia Pacific Association of Technology and Society, Hong Kong
Francis Lee Bu Sung, Nanyang Technological University, Singapore
Peter Loh Kok Keong, Singapore Institute of Technology, Singapore
Ben Martini, University of South Australia, Australia
Veena Mendiratta, Bell Labs, Alcatel-Lucent, USA
Sudsanguan Ngamsuriyaroj, Mahidol University, Thailand
Giovanni Russello, University of Auckland, New Zealand
Guojun Wang, Central South University, China

* Contact

Please email inquiries concerning the symposium to Ryan Ko or Kim-Kwang Raymond Choo.

Related Resources

IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications
RAID 2017   20th International Symposium on Research in Attacks, Intrusions and Defenses
IEEE - ISCMI 2017   2017 4th Intl. Conference on Soft Computing & Machine Intelligence (ISCMI 2017)--IEEE Xplore, Ei Compendex
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
INTIS 2017   The sixth International Conference on Innovation and New Trends in Information Systems
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
ICSC 2018   12th IEEE International Conference on Semantic Computing (ICSC 2018)
IJCCSA 2017   International Journal on Cloud Computing: Services and Architecture
ISCMI - IEEE 2017   2017 4th Intl. Conference on Soft Computing & Machine Intelligence (ISCMI 2017)--IEEE Xplore, Ei Compendex
AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance