posted by user: lferrett || 1047 views || tracked by 2 users: [display]

CCSW 2015 : Call for Participation: 2015 ACM Cloud Computing Security Workshop


When Oct 16, 2015 - Oct 16, 2015
Where Denver, Colorado, USA
Submission Deadline TBD

Call For Papers

Call for Participation:
2015 ACM Cloud Computing Security Workshop (CCSW)
October 16, 2015, Denver, Colorado, USA
In conjunction with the 22nd ACM CCS Conference


The CCSW workshop brings together researchers and practitioners in all security
and privacy aspects of cloud-centric and outsourced computing, to act as a
fertile ground for creative debate and interaction in security-sensitive areas
of computing impacted by clouds.

The 2015 edition of the CSSW workshop will take place on October 16, 2015, after
the 22nd ACM CCS Conference, in Denver, Colorado, USA. The workshop will feature
three paper presentations sessions and three keynote speeches.

* Early bird registration: September 20, 2015

* Registration information at:

* Keynote speakers:
- Mike Reiter, University of North-Carolina
- Chenxi Wang, Ciphercloud
- Bruce Grenfell, Concur/SAP

* Program (details and updates at
- 8:45 - 8:55, Welcome
- 8:55 - 9:55, Keynote: Mike Reiter (University of North-Carolina)
+ Side-Channels in Multi-Tenant Environments
- 9:55 - 10:45, Session I: System Security
+ How Private is Your Private Cloud? - Security Analysis of Cloud
Control Interfaces
Dennis Felsch (Ruhr-University Bochum); Mario Heiderich
(Ruhr-University Bochum); Frederic Schulz (Ruhr-University Bochum);
Joerg Schwenk (Ruhr-University Bochum)
+ Return Of The Covert Channel, Data Center Style
Ken Block (Northeastern University); Guevara Noubir (Northeastern
- 11:10 - 12:10, Keynote: Chenxi Wang (Ciphercloud)
+ Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge
- 2:00 - 2:50, Keynote: Bruce Grenfell (Concur/SAP)
+ Being Successful in the Cloud -- Special secret or just plain old
logic the secret
- 2:50 - 3:40, Session II: Applied Cryptography
+ Performance Analysis of Linux RNG in Virtualized Environments
Rashmi Kumari (University of Calgary); Mohsen Alimomeni (University
of Calgary); Reihaneh Safavi Naini (University of Calgary)
+ Fast Order-Preserving Encryption from Uniform Distribution Sampling
Yong Ho Hwang (Samsung); Sungwook Kim (Samsung); Jae Woo Seo
- 4:00 - 4:50, Session III: Applied Cryptography II
+ Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with
Multiple Data Owners
Frank Li (University of California Berkeley); Eui Chul Richard Shin
(University of California Berkeley); Vern Paxson (UC Berkeley/ICSI)
+ ORAM based forward privacy preserving Dynamic Searchable Symmetric
Encryption Schemes
Panagiotis Rizomiliotis (University of the Aegean); Stefanos
Gritzalis (University of the Aegean)

* Organizers:
- Cristina Nita-Rotaru, Purdue University (PC Co-Chair)
- Florian Kerschbaum, SAP (PC Co-Chair)
- Gene Tsudik, University of California, Irvine (Steering Chair)
- Indrajit Ray, Colorado State University (General Chair)

Related Resources

ICCT-IEEE 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)
ICCBDC - ACM 2017   International Conference on Cloud and Big Data Computing (ICCBDC 2017)--Ei Compendex and Scopus
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
IEEE Cluster 2017   International Conference on Cluster Computing
Middleware 2017   International Middleware Conference
DASC 2017   The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
ICCAC 2017   2017 IEEE International Conference on Cloud and Autonomic Computing (ICCAC)
EMSICC 2017   International Workshop on Energy Management for Sustainable Internet-of-Things and Cloud Computing
SI - IoT and Big Data 2017   IoT and Big Data: An Extraordinary Synergy