posted by organizer: enricobacis || 3964 views || tracked by 11 users: [display]

IEEE SPC 2016 : 2nd IEEE Workshop on Security and Privacy in the Cloud


When Oct 19, 2016 - Oct 19, 2016
Where Philadelphia, PA, USA
Submission Deadline Jul 12, 2016
Notification Due Aug 3, 2016
Final Version Due Aug 10, 2016
Categories    security   privacy   cloud   computer science

Call For Papers


2nd IEEE Workshop on Security and Privacy in the Cloud (IEEE SPC 2016)
October 19, 2016, Philadelphia, PA, USA

Cloud computing is today the reference paradigm for large-scale data
storage and processing due to the convenient and efficient network
access to configurable resources that can be easily adjusted according
to the users' needs. Although the benefits of cloud computing are
tremendous, security and privacy concerns have still a detrimental
impact on the adoption and acceptability of cloud services. In fact,
users as well as companies that rely on cloud storage and computation
services lose the direct control over the systems managing their data
and applications, thus putting the confidentiality, integrity and
availability of the data at risk. The goal of this workshop is to
bring together researchers and practitioners who are interested in
discussing the security, privacy, and data protection issues emerging
in cloud scenarios, and possible solutions to them.

The workshop seeks submissions from academia, industry, and government
presenting novel research, as well as experimental studies, on all
theoretical and practical aspects of security, privacy, and data
protection in cloud scenarios.

Topics of interest include, but are not limited to:

* Anonymity in cloud scenarios
* Applied cryptography in cloud scenarios
* Cloud-based biometric systems
* Data and application security
* Data and system integrity
* Data availability in outsourcing scenarios
* Data protection
* Efficient access to outsourced data
* Key management in cloud scenarios
* Privacy
* Privacy of accesses
* Secure computation over encrypted data
* Security and trust metrics
* Security and privacy in crowdsourcing
* Security and privacy in multi-clouds and federated clouds
* Security and privacy in data outsourcing
* Security and privacy in the Internet of Things
* Security and privacy of big data
* Security and privacy of distributed computations
* Security and privacy of fog computing
* Security and privacy policies
* Selective information sharing
* Threats, vulnerabilities, and risk management

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 9 pages in
the IEEE 8,5”x11” two-column format

Submissions must not be anonymized. The workshop will also consider
short submissions of up to 4 pages for results that are preliminary or
that simply require few pages.

Papers should be submitted for review through EDAS. Only PDF files
will be accepted. Submissions not meeting these guidelines risk
rejection without consideration of their merits. Papers must be
received by the deadline of July 12, 2016 (11:59 p.m. American Samoa
time). Authors of accepted papers must guarantee that their papers
will be presented at the workshop.

The electronic submission site is available at:

Accepted and presented papers will be included in the IEEE CNS 2016
conference proceedings and also in IEEE Xplore.

Paper submission due: The deadline has been extended to July 12, 2016 (11:59 p.m. American Samoa time)
Notification to authors: August 3, 2016
Camera ready due: August 10, 2016 (hard deadline)

Pierangela Samarati, Università degli Studi di Milano, Italy

Stefano Paraboschi, Università degli Studi di Bergamo, Italy

Massimiliano Albanese, George Mason University, USA
Roy Campbell, University of Illinois at Urbana-Champaign, USA
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Raymond Choo, University of South Australia, Australia
Theo Dimitrakos, British Telecom, UK
Sara Foresti, Università degli Studi di Milano, Italy
Ghassan Karame, NEC Labs, Germany
Florian Kerschbaum, SAP, Germany
Gregory Neven, IBM Zurich, Switzerland
Melek Önen, EURECOM, France
Siani Pearson, HP Labs, UK
Pierangela Samarati, Università degli Studi di Milano, Italy
Andreas Schaad, Huawei Research, Germany
Scott Stoller, Stony Brook University, USA
Neeraj Suri, TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, Hong Kong
Meng Yu, University of Texas at San Antonio, USA

Enrico Bacis, Università degli Studi di Bergamo, Italy

If you have any question, please contact the organizers at

Related Resources

WACV 2017   IEEE Winter Conference on Applications of Computer Vision
ICONIP 2017   International Conference on Neural Information Processing
4th IEEE ICIIP 2017   International Conference on Image Information Processing (ICIIP 2017)
ACML 2017   The 9th Asian Conference on Machine Learning
SI: IEEE Access VSB 2017   IEEE Access Special Section on Visual Surveillance and Biometrics: Practices, Challenges, and Possibilities
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
SOCA 2017   The 10 th IEEE International Conference on Service Oriented Computing and Applications
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies