posted by user: bigheaddavid || 4715 views || tracked by 8 users: [display]

IWCSF 2015 : The International Workshop on Cloud Security and Forensics

FacebookTwitterLinkedInGoogle

Link: http://cms.uhd.edu/faculty/yuans/research/IWCSF-2015.htm
 
When Nov 2, 2015 - Nov 4, 2015
Where Shenzhen
Submission Deadline Sep 10, 2015
Notification Due Sep 21, 2015
Final Version Due Oct 1, 2015
Categories    cloud   security   digital forensics
 

Call For Papers

Direct paper submission link: https://edas.info/newPaper.php?c=20983&track=74419

Cloud computing is an emerging yet revolutionary technology. It has started changing the ways people live and work. With the rapid growth of cloud and related services, security and privacy in the Cloud have become increasingly critical issues in the research realm of communications and networks security. The introduction of cloud in existing computer systems and networks has changed the security perspectives and measures, consequently affecting how crime related digital evidence is retrieved, processed, and presented in this environment.
The International Workshop on Cloud Security and Forensics (IWCSF 2015), aptly named for its goals, is a one-day research workshop organized with the objective of bringing together top researchers working on the intersection of the Security of Cloud computing and storage as well as cyber forensics and cyber law to present and discuss their latest research results and ideas, thereby promoting the development and the evolution of this combined body of knowledge. All submissions enabling cross-pollination of ideas on cloud security, cloud privacy, cloud forensics, cyber law, and eDiscovery are welcome. IWCSF 2015 encourages and accepts novel, innovative, and previously unpublished works. Topics include, but are not limited to:

· Infrastructure Cloud Security
· Data and Storage Security in Cloud
· Cloud Access Control
· Cloud Security Management
· Security Hacking and Countermeasures in the Cloud
· Cloud Risk Management and Disaster Recovery
· Cloud Auditing and Compliance
· Security As a Cloud Services
· Mobile Cloud Security and Privacy
· Cyber Law and Terrorism in the Cloud
· Cloud Forensics Process and Models
· Cloud Forensic Data Acquisition
· Cloud Digital Evidence Management
· Cloud Auditing and Compliance
· Cloud Digital Evidence Analysis and Presentation
· Mobile and Wireless Cloud Forensics
· Cloud eDiscovery

The workshop organizers cordially invite submissions of original research work to The International Workshop on Cloud Security and Forensics (IWCSF 2015), in conjunction with The 2015 IEEE/CIC International Conference on Communications in China, to be held on November 2-4, 2015 in Shenzhen, China. Listed below is important information of the workshop and more information of the workshop can be found here http://cms.uhd.edu/faculty/yuans/research/IWCSF_2015.htm. Paper formatting and submission instructions can be found at the 2015 IEEE ICCC website http://www.ieee-iccc.org/submguide.html.
Workshop Organizers
· Shengli Yuan, Ph.D., Associate Professor, Department of Computer Science and Engineering Technology, University of Houston-Downtown; One Main St. Houston, TX 77002, USA; yuans@uhd.edu; Phone: 1-(713) 221-8572; Fax: 1-(713)-223-7407. (primary contact)

· Lei Chen, Ph.D., Associate Professor, Department of Information Technology, Georgia Southern University; P.O. BOX 8150, Statesboro, GA 30460, USA; lchen@georgiasouthern.edu; Phone: 1-(912) 478-5363; Fax: 1-(912) 478-7883.


Important Dates and Location
Workshop: November 1, 2015
Location: Shenzhen, China (venue to be announced)
Paper Due: September 10, 2015
Paper Notification: September 21, 2015
Camera-ready Paper Due: October 1, 2015
Tentative List of Technical Program Committee (TPC) Members
• Dr. Irfan Ahmed, University of New Orleans, USA

• Dr. Lei Chen, Georgia Southern University, USA

• Dr. Song Fu, University of North Texas, USA

• Dr. Lila Ghemri, Texas Southern University, USA
• Dr. Guofei Gu, Texas A&M University, USA

• Dr. Wen-Chen Hu, University of North Dakota, USA

• Dr. Yiming Ji, University of South Carolina Beaufort, USA

• Dr. Wei Wayne Li, Texas Southern University, USA
• Dr. Zhiqiang Lin, University of Texas at Dallas, USA

• Dr. Hassan Takabi, University of North Texas, USA

• Dr. Jie Wu, Temple University, USA

• Dr. Chengjun Wang, Vermont Technical college, USA

• Dr. Shaoen Wu, Ball State University, USA

• Dr. Gongjun Yan, University of Southern Indiana, USA

• Dr. Qing Yang, Montana State University, USA

• Dr. Ming Yang, Kennesaw State University, USA

• Dr. Shengli Yuan, University of Houston-Downtown, USA

▪ Mr. Dongyup Han, Georgia Southern University

Related Resources

UNet 2018   Fourth International Symposium on Ubiquitous Networking
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ICSIE--Ei Compendex, Scopus 2018   2018 7th International Conference on Software and Information Engineering (ICSIE 2018)--Ei Compendex, Scopus
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
CLOUD 2018   The 11th International Conference on Cloud Computing
IJCSITY 2017   International Journal of Computational Science and Information Technology
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm