posted by organizer: zrlkne || 3843 views || tracked by 10 users: [display]

SPC 2015 : First Workshop on Security and Privacy in the Cloud


When Sep 30, 2015 - Sep 30, 2015
Where Florence, Italy
Submission Deadline Jul 9, 2015
Notification Due Aug 3, 2015
Final Version Due Aug 10, 2015
Categories    security   privacy   cloud-computing

Call For Papers

** Deadlne extended: July 9, 2015 - 11.59 pm American Samoa Time **

First IEEE Workshop on Security and Privacy in the Cloud (SPC 2015)
Florence, Italy - September 30, 2015

Cloud computing is today the reference paradigm for large-scale data
storage and processing due to the convenient and efficient network
access to configurable resources that can be easily adjusted according
to the users' needs. Although the benefits of cloud computing are
tremendous, security and privacy concerns have still a detrimental
impact on the adoption and acceptability of cloud services.
In fact, users as well as companies that rely on cloud storage and
computation services lose the direct control over the systems
managing their data and applications, thus putting the confidentiality,
integrity and availability of the data at risk. The goal of this
workshop is to bring together researchers and practitioners who are
interested in discussing the security, privacy, and data protection
issues emerging in cloud scenarios, and possible solutions to them.

SPC 2015 will be held in Florence, Italy, in conjunction with the
IEEE Conference on Communications and Network Security (CNS 2015).

The workshop seeks submissions from academia, industry, and government
presenting novel research, as well as experimental studies, on all
theoretical and practical aspects of security, privacy, and data
protection in cloud scenarios.
Topics of interest include, but are not limited to:
- Anonymity in cloud scenarios
- Applied cryptography in cloud scenarios
- Data and application security
- Data and system integrity
- Data availability in outsourcing scenarios
- Data protection
- Efficient access to outsourced data
- Key management in cloud scenarios
- Privacy
- Privacy of accesses
- Secure computation over encrypted data
- Security and trust metrics
- Security and privacy in crowdsourcing
- Security and privacy in multi-clouds and federated clouds
- Security and privacy in data outsourcing
- Security and privacy in the Internet of Things
- Security and privacy of big data
- Security and privacy of distributed computations
- Security and privacy policies
- Selective information sharing
- Threats, vulnerabilities, and risk management

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 9 pages
in the IEEE 8,5"x11" two-column format
Submissions should not be anonymized. The workshop will also consider
short submissions of up to 4 pages for results that are preliminary or
that simply require few pages to describe.
Papers should be submitted for review through EDAS
( Only PDF files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the deadline
of July 9, 2015 (11:59 p.m. American Samoa time).
Authors of accepted papers must guarantee that their papers will be
presented at the workshop.
Accepted and presented papers will be published in the IEEE 2015
Conference Proceedings and submitted to IEEE Xplore as well as
other Abstracting and Indexing (A&I) databases.

Paper submission due [extended]: July 9, 2015 -- 11:59 p.m. American Samoa time
Notification to authors: August 3, 2015
Camera ready due: August 10, 2015

Elli Androulaki, IBM Research - Zurich, Switzerland
Sara Foresti, Università degli Studi di Milano, Italy

Nikola Knežević, IBM Research - Zurich, Switzerland

Massimiliano Albanese, George Mason University, USA
Rajkumar Buyya, University of Melbourne, Australia
Christian Cachin, IBM Research Zurich, Switzerland
Roy Campbell, University of Illinois at Urbana-Champaign, USA
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Theo Dimitrakos, British Telecom, UK
Sotiris Ioannidis, FORTH, Greece
Seny Kamara, Microsoft Research, USA
Ghassan Karame, NEC Labs, Germany
Florian Kerschbaum, SAP, Germany
Samee Khan, North Dakota State University, USA
Javier Lopez, University of Malaga, Spain
Jesus Luna, CSA Europe, UK
Melek Onen, EURECOM, France
Stefano Paraboschi,Università di Bergamo, Italy
Siani Pearson, HP Labs, UK
Kui Ren, University at Buffalo, USA
Pierangela Samarati, Università degli Studi di Milano, Italy
Andreas Schaad, Huawei Research, Germany
Anoop Singhal, NIST, USA
Alessandro Sorniotti, IBM Research - Zurich, Switzerland
Neeraj Suri, TU Darmstadt, Germany
Jaideep Vaidya, Rutgers University, USA
Cong Wang, City University of Hong Kong, Hong Kong
Meng Yu, Virginia Commonwealth University, USA
Moti Yung, Google, USA

If you have any question, please contact the organizers at

Related Resources

IEEE SPC 2017   IEEE Workshop on Security and Privacy in the Cloud
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
MPS 2017   The 1st International Workshop on Multimedia Privacy and Security -- held in conjunction with the 24th ACM Conference on Computer and Communication Security (CCS 2017)
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
ASPMI 2018   Advances in Security and Privacy of Multimodal Interfaces
ICISSP 2018   4th International Conference on Information Systems Security and Privacy
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
TSP 2017   The 7th International Symposium on Trust, Security and Privacy for Emerging Applications