posted by user: javaboom || 4085 views || tracked by 5 users: [display]

DSCC 2016 : Call for Book Chapter Proposals - Data Security in Cloud Computing

FacebookTwitterLinkedInGoogle

Link: https://crow.org.nz/CFCP-DataSecCloudBook.pdf
 
When N/A
Where N/A
Abstract Registration Due Mar 13, 2016
Submission Deadline Jul 31, 2016
Notification Due Sep 19, 2016
Categories    cloud computing   cloud security   data security
 

Call For Papers

** Data Security in Cloud Computing **

Call for Book Chapter Proposals
========================================

Cloud computing is transforming the way we view and perform computing. Many organizations have already embraced this paradigm of a centralized cloud, due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. These benefits however are traded with the control of data, since data is stored, computed upon and accessed on the cloud, away from the premises of the data owner and the data user. This loss of control of data gives rise to a number of challenging data security issues, ranging from accountability, to data provenance, to identity and risk management among others. These issues have the capability to determine how effective and widespread cloud computing of the next generation is going to be and their solutions can push us into the right direction.
The book intends to provide the reader with a coverage of a wide range of issues on data security in cloud computing. It will cover issues directly related to various aspects of data security in cloud computing, along with a selection of topics on emerging technologies. The book will be published by Institute of Engineering and Technology (IET).

Topics of interest include but are not limited to:
Section 1: Data-at-Rest
1. Secure data sharing in cloud
2. Remote data integrity check for auditing in cloud
3. Data leakage in cloud
4. Data loss/resilience in cloud
5. Access control of encrypted data in cloud

Section 2: Data-in-Transit
6. Secure information flow in and out of clouds
7. Emerging cloud encryption technologies

Section 3: Data-in-Processing
8. Accountability of data in cloud
9. Secure and privacy preserving computation in cloud
10. Secure virtual environments

Section 4: Data Provenance
11. Provenance of data in cloud
12. Security attribution in and across clouds
13. Identity management in federated clouds



Section 5: Governance, Risk, Compliance
14. Risk management in clouds
15. Cloud data governance
16. Data privacy legislation and integration with technologies

Section 6: Data Security Challenges in Emerging Technologies
17. Bring your own device
18. Internet of Things
19. Cyber-physical systems
20. Vehicular ad hoc networks




BOOK CHAPTER SUBMISSION AND AUTHOR INFORMATION
Chapter Proposals
Prospective authors must submit their chapter proposals in pdf format to https://easychair.org/conferences/?conf=dataseccloudbook2016 with the following information:
1. Chapter Title
2. Author Names, Affiliations
3. Author Emails
4. Book Section/ Topic Addressed (If this is not in the list above, please suggest)
5. Chapter Extended Abstract (300 words maximum)
6. Chapter Sections/ Chapter Outline (in bullet-point form)
7. Author Biography and Relevant Experience (100 words maximum)
While this is a call for proposals, completed chapter manuscripts are also welcome.
Submission of Manuscripts for Approved Proposals

After their proposals are approved, prospective authors will be invited to submit their manuscripts electronically. Submitted manuscripts will undergo a single-blind peer-review process. To ensure the quality of accepted manuscripts, each manuscript is typically reviewed by at least two independent expert reviewers. Only accepted peer-reviewed manuscripts will be published.

Submitted manuscripts should conform to the standard guidelines of the IET book chapter format, which can be downloaded from here. Manuscripts that do not follow the formatting rules will be ignored. Manuscripts should also be written in a way that it is teaching a topic, and not just pure academic reports of research work or proposals. Vendor neutrality must be observed in the manuscripts. Survey papers of the above topics are welcome.


IMPORTANT DATES
* Chapter proposal due: 13 March 2016
* Book chapter submission: 31 July 2016
* Authors’ notification: 19 September 2016
* Chapter Camera ready version: December 2016
* Estimated publication: September 2017


BOOK EDITORS

Dr. Vimal Kumar
University of Waikato, New Zealand
vkumar@waikato.ac.nz
http://www.cms.waikato.ac.nz/people/vkumar

Dr Ryan Ko
University of Waikato, New Zealand
ryan@waikato.ac.nz
http://ryanko.org

Dr. Sivadon Chaisiri
University of Waikato, New Zealand
chaisiri@waikato.ac.nz
http://www.cms.waikato.ac.nz/people/chaisiri

Related Resources

ESPR-IoTBD 2020   Applied Scieces (Q1), Enterprise Security, Privacy and Risk for Internet of Things and Big Data (ESPR-IoTBD)
IEEE-CTISC 2020   2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2020)
CyberHunt 2020   International Workshop on Big Data Analytics for Cyber Threat Hunting
COMIT 2020   4th International Conference on Computer Science and Information Technology
Call for Contributions 2021   Beyond the 2ºC: Business and Policy Trajectories to Climate Change Adaptation
CCNET 2020   7th International Conference on Computer Networks & Communications
IEEE HotICN--Ei, scopus 2020   2020 3rd IEEE International Conference on Hot Information-Centric Networking (IEEE HotICN 2020)--Ei Compendex, scopus
ACM--ICACS--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Algorithms, Computing and Systems (ICACS 2020)--Ei Compendex, Scopus
IoT-DataScience 2020   Call for Book Chapters on Emerging Trends in IoT and Integration with Data Science, IGI Global 2020
ICBICC 2020   2020 2nd International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2020)