| |||||||||||||||
ACM CCSW 2016 : 8rd ACM Cloud Computing Security Workshop | |||||||||||||||
Link: https://www.zurich.ibm.com/ccsw16/index.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
============================================
8rd ACM Cloud Computing Security Workshop Hofburg Palace, Vienna, Austria October 28, 2016 https://www.zurich.ibm.com/ccsw16/index.html ============================================ Cloud computing is a dominant trend in computing for the foreseeable future; e.g., major cloud operators are now estimated to house over a million machines each and to host substantial (and growing) fractions of our IT and web infrastructure. CCSW is a forum for bringing together researchers and practitioners to discuss the implications of this trend to the security of cloud operators, tenants, and the larger Internet community. We invite submissions on new threats, countermeasures, and opportunities brought about by the move to cloud computing, with a preference for unconventional approaches, as well as measurement studies and case studies that shed light on the security implications of clouds. ACM CCSW’16 seeks submissions from academia, industry, and government presenting novel research, as well as experimental studies, on all theoretical and practical aspects of security, privacy, and data protection in cloud scenarios. Topics of interest include, but are not limited to: - secure cloud resource virtualization - secure data management outsourcing - practical privacy and integrity mechanisms for outsourcing - cloud-centric threat models - secure outsourced computation - remote attestation mechanisms in clouds - sandboxing and VM-based enforcement - trust and policy management in clouds - secure identity management mechanisms - cloud-aware web service security paradigms and mechanisms - cloud-centric regulatory compliance issues and mechanisms - business and security risk models for clouds - cost and usability models and their interaction with cloud security - scalability of secure clouds - trusted computing technology and clouds - analysis of software for remote attestation and cloud protection - network security (DoS, IDS, etc.) mechanisms for clouds - security for cloud programming models We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. IMPORTANT DATES =============== - Paper submission deadline: July 27, 2016 23:59:59 EDT - Acceptance notification: September 5, 2016 - (Hard) camera-ready deadline: September 15, 2016 CONTACT ======= Please direct any questions to ccsw16-pcchairs@cs.unc.edu. |
|