posted by user: bigheaddavid || 6214 views || tracked by 10 users: [display]

IWCSF 2015 : The International Workshop on Cloud Security and Forensics

FacebookTwitterLinkedInGoogle

Link: http://cms.uhd.edu/faculty/yuans/research/IWCSF-2015.htm
 
When Nov 2, 2015 - Nov 4, 2015
Where Shenzhen
Submission Deadline Sep 10, 2015
Notification Due Sep 21, 2015
Final Version Due Oct 1, 2015
Categories    cloud   security   digital forensics
 

Call For Papers

Direct paper submission link: https://edas.info/newPaper.php?c=20983&track=74419

Cloud computing is an emerging yet revolutionary technology. It has started changing the ways people live and work. With the rapid growth of cloud and related services, security and privacy in the Cloud have become increasingly critical issues in the research realm of communications and networks security. The introduction of cloud in existing computer systems and networks has changed the security perspectives and measures, consequently affecting how crime related digital evidence is retrieved, processed, and presented in this environment.
The International Workshop on Cloud Security and Forensics (IWCSF 2015), aptly named for its goals, is a one-day research workshop organized with the objective of bringing together top researchers working on the intersection of the Security of Cloud computing and storage as well as cyber forensics and cyber law to present and discuss their latest research results and ideas, thereby promoting the development and the evolution of this combined body of knowledge. All submissions enabling cross-pollination of ideas on cloud security, cloud privacy, cloud forensics, cyber law, and eDiscovery are welcome. IWCSF 2015 encourages and accepts novel, innovative, and previously unpublished works. Topics include, but are not limited to:

· Infrastructure Cloud Security
· Data and Storage Security in Cloud
· Cloud Access Control
· Cloud Security Management
· Security Hacking and Countermeasures in the Cloud
· Cloud Risk Management and Disaster Recovery
· Cloud Auditing and Compliance
· Security As a Cloud Services
· Mobile Cloud Security and Privacy
· Cyber Law and Terrorism in the Cloud
· Cloud Forensics Process and Models
· Cloud Forensic Data Acquisition
· Cloud Digital Evidence Management
· Cloud Auditing and Compliance
· Cloud Digital Evidence Analysis and Presentation
· Mobile and Wireless Cloud Forensics
· Cloud eDiscovery

The workshop organizers cordially invite submissions of original research work to The International Workshop on Cloud Security and Forensics (IWCSF 2015), in conjunction with The 2015 IEEE/CIC International Conference on Communications in China, to be held on November 2-4, 2015 in Shenzhen, China. Listed below is important information of the workshop and more information of the workshop can be found here http://cms.uhd.edu/faculty/yuans/research/IWCSF_2015.htm. Paper formatting and submission instructions can be found at the 2015 IEEE ICCC website http://www.ieee-iccc.org/submguide.html.
Workshop Organizers
· Shengli Yuan, Ph.D., Associate Professor, Department of Computer Science and Engineering Technology, University of Houston-Downtown; One Main St. Houston, TX 77002, USA; yuans@uhd.edu; Phone: 1-(713) 221-8572; Fax: 1-(713)-223-7407. (primary contact)

· Lei Chen, Ph.D., Associate Professor, Department of Information Technology, Georgia Southern University; P.O. BOX 8150, Statesboro, GA 30460, USA; lchen@georgiasouthern.edu; Phone: 1-(912) 478-5363; Fax: 1-(912) 478-7883.


Important Dates and Location
Workshop: November 1, 2015
Location: Shenzhen, China (venue to be announced)
Paper Due: September 10, 2015
Paper Notification: September 21, 2015
Camera-ready Paper Due: October 1, 2015
Tentative List of Technical Program Committee (TPC) Members
• Dr. Irfan Ahmed, University of New Orleans, USA

• Dr. Lei Chen, Georgia Southern University, USA

• Dr. Song Fu, University of North Texas, USA

• Dr. Lila Ghemri, Texas Southern University, USA
• Dr. Guofei Gu, Texas A&M University, USA

• Dr. Wen-Chen Hu, University of North Dakota, USA

• Dr. Yiming Ji, University of South Carolina Beaufort, USA

• Dr. Wei Wayne Li, Texas Southern University, USA
• Dr. Zhiqiang Lin, University of Texas at Dallas, USA

• Dr. Hassan Takabi, University of North Texas, USA

• Dr. Jie Wu, Temple University, USA

• Dr. Chengjun Wang, Vermont Technical college, USA

• Dr. Shaoen Wu, Ball State University, USA

• Dr. Gongjun Yan, University of Southern Indiana, USA

• Dr. Qing Yang, Montana State University, USA

• Dr. Ming Yang, Kennesaw State University, USA

• Dr. Shengli Yuan, University of Houston-Downtown, USA

▪ Mr. Dongyup Han, Georgia Southern University

Related Resources

JoWUA SI 2021   JoWUA Special Issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges
AVC 2020   Advances in Vision Computing: An International Journal
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
CLSB 2020   International Conference on Cloud Computing, Security and Blockchain
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
JSE 2020   9th International Conference on Software Engineering and Applications
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ICBICC 2020   2020 2nd International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2020)
IoTE 2020   International Conference on Internet of Things & Embedded Systems
CCNC 2021   IEEE Consumer Communications & Networking Conference