| |||||||||
CCSW 2015 : Call for Participation: 2015 ACM Cloud Computing Security Workshop | |||||||||
Link: http://ccsw.ics.uci.edu/15 | |||||||||
| |||||||||
Call For Papers | |||||||||
Call for Participation:
2015 ACM Cloud Computing Security Workshop (CCSW) October 16, 2015, Denver, Colorado, USA In conjunction with the 22nd ACM CCS Conference http://ccsw.ics.uci.edu/15/ ------------------------------------------------------ The CCSW workshop brings together researchers and practitioners in all security and privacy aspects of cloud-centric and outsourced computing, to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds. The 2015 edition of the CSSW workshop will take place on October 16, 2015, after the 22nd ACM CCS Conference, in Denver, Colorado, USA. The workshop will feature three paper presentations sessions and three keynote speeches. * Early bird registration: September 20, 2015 * Registration information at: http://www.sigsac.org/ccs/CCS2015/pro_reg.html * Keynote speakers: - Mike Reiter, University of North-Carolina - Chenxi Wang, Ciphercloud - Bruce Grenfell, Concur/SAP * Program (details and updates at http://ccsw.ics.uci.edu/15/program.html): - 8:45 - 8:55, Welcome - 8:55 - 9:55, Keynote: Mike Reiter (University of North-Carolina) + Side-Channels in Multi-Tenant Environments - 9:55 - 10:45, Session I: System Security + How Private is Your Private Cloud? - Security Analysis of Cloud Control Interfaces Dennis Felsch (Ruhr-University Bochum); Mario Heiderich (Ruhr-University Bochum); Frederic Schulz (Ruhr-University Bochum); Joerg Schwenk (Ruhr-University Bochum) + Return Of The Covert Channel, Data Center Style Ken Block (Northeastern University); Guevara Noubir (Northeastern University) - 11:10 - 12:10, Keynote: Chenxi Wang (Ciphercloud) + Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection - 2:00 - 2:50, Keynote: Bruce Grenfell (Concur/SAP) + Being Successful in the Cloud -- Special secret or just plain old logic the secret - 2:50 - 3:40, Session II: Applied Cryptography + Performance Analysis of Linux RNG in Virtualized Environments Rashmi Kumari (University of Calgary); Mohsen Alimomeni (University of Calgary); Reihaneh Safavi Naini (University of Calgary) + Fast Order-Preserving Encryption from Uniform Distribution Sampling Yong Ho Hwang (Samsung); Sungwook Kim (Samsung); Jae Woo Seo (Samsung) - 4:00 - 4:50, Session III: Applied Cryptography II + Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li (University of California Berkeley); Eui Chul Richard Shin (University of California Berkeley); Vern Paxson (UC Berkeley/ICSI) + ORAM based forward privacy preserving Dynamic Searchable Symmetric Encryption Schemes Panagiotis Rizomiliotis (University of the Aegean); Stefanos Gritzalis (University of the Aegean) * Organizers: - Cristina Nita-Rotaru, Purdue University (PC Co-Chair) - Florian Kerschbaum, SAP (PC Co-Chair) - Gene Tsudik, University of California, Irvine (Steering Chair) - Indrajit Ray, Colorado State University (General Chair) |
|