posted by organizer: zrlkne || 1858 views || tracked by 10 users: [display]

SPC 2015 : First Workshop on Security and Privacy in the Cloud


When Sep 30, 2015 - Sep 30, 2015
Where Florence, Italy
Submission Deadline Jul 9, 2015
Notification Due Aug 3, 2015
Final Version Due Aug 10, 2015
Categories    security   privacy   cloud-computing

Call For Papers

** Deadlne extended: July 9, 2015 - 11.59 pm American Samoa Time **

First IEEE Workshop on Security and Privacy in the Cloud (SPC 2015)
Florence, Italy - September 30, 2015

Cloud computing is today the reference paradigm for large-scale data
storage and processing due to the convenient and efficient network
access to configurable resources that can be easily adjusted according
to the users' needs. Although the benefits of cloud computing are
tremendous, security and privacy concerns have still a detrimental
impact on the adoption and acceptability of cloud services.
In fact, users as well as companies that rely on cloud storage and
computation services lose the direct control over the systems
managing their data and applications, thus putting the confidentiality,
integrity and availability of the data at risk. The goal of this
workshop is to bring together researchers and practitioners who are
interested in discussing the security, privacy, and data protection
issues emerging in cloud scenarios, and possible solutions to them.

SPC 2015 will be held in Florence, Italy, in conjunction with the
IEEE Conference on Communications and Network Security (CNS 2015).

The workshop seeks submissions from academia, industry, and government
presenting novel research, as well as experimental studies, on all
theoretical and practical aspects of security, privacy, and data
protection in cloud scenarios.
Topics of interest include, but are not limited to:
- Anonymity in cloud scenarios
- Applied cryptography in cloud scenarios
- Data and application security
- Data and system integrity
- Data availability in outsourcing scenarios
- Data protection
- Efficient access to outsourced data
- Key management in cloud scenarios
- Privacy
- Privacy of accesses
- Secure computation over encrypted data
- Security and trust metrics
- Security and privacy in crowdsourcing
- Security and privacy in multi-clouds and federated clouds
- Security and privacy in data outsourcing
- Security and privacy in the Internet of Things
- Security and privacy of big data
- Security and privacy of distributed computations
- Security and privacy policies
- Selective information sharing
- Threats, vulnerabilities, and risk management

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 9 pages
in the IEEE 8,5"x11" two-column format
Submissions should not be anonymized. The workshop will also consider
short submissions of up to 4 pages for results that are preliminary or
that simply require few pages to describe.
Papers should be submitted for review through EDAS
( Only PDF files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the deadline
of July 9, 2015 (11:59 p.m. American Samoa time).
Authors of accepted papers must guarantee that their papers will be
presented at the workshop.
Accepted and presented papers will be published in the IEEE 2015
Conference Proceedings and submitted to IEEE Xplore as well as
other Abstracting and Indexing (A&I) databases.

Paper submission due [extended]: July 9, 2015 -- 11:59 p.m. American Samoa time
Notification to authors: August 3, 2015
Camera ready due: August 10, 2015

Elli Androulaki, IBM Research - Zurich, Switzerland
Sara Foresti, Università degli Studi di Milano, Italy

Nikola Knežević, IBM Research - Zurich, Switzerland

Massimiliano Albanese, George Mason University, USA
Rajkumar Buyya, University of Melbourne, Australia
Christian Cachin, IBM Research Zurich, Switzerland
Roy Campbell, University of Illinois at Urbana-Champaign, USA
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Theo Dimitrakos, British Telecom, UK
Sotiris Ioannidis, FORTH, Greece
Seny Kamara, Microsoft Research, USA
Ghassan Karame, NEC Labs, Germany
Florian Kerschbaum, SAP, Germany
Samee Khan, North Dakota State University, USA
Javier Lopez, University of Malaga, Spain
Jesus Luna, CSA Europe, UK
Melek Onen, EURECOM, France
Stefano Paraboschi,Università di Bergamo, Italy
Siani Pearson, HP Labs, UK
Kui Ren, University at Buffalo, USA
Pierangela Samarati, Università degli Studi di Milano, Italy
Andreas Schaad, Huawei Research, Germany
Anoop Singhal, NIST, USA
Alessandro Sorniotti, IBM Research - Zurich, Switzerland
Neeraj Suri, TU Darmstadt, Germany
Jaideep Vaidya, Rutgers University, USA
Cong Wang, City University of Hong Kong, Hong Kong
Meng Yu, Virginia Commonwealth University, USA
Moti Yung, Google, USA

If you have any question, please contact the organizers at

Related Resources

IJISS 2016   International Journal of Information Security Science (IJISS)
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
SeMoCloud 2017   The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Cloud
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
BigDataSecurity 2017   The 3rd IEEE International Conference on Big Data Security on Cloud
IJMSA 2016   International Journal of Modelling, Simulation and Applications
ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations