posted by user: mickeylaw || 9831 views || tracked by 7 users: [display]

CSAAPACCON 2016 : Cloud Security Alliance APAC Congress 2016

FacebookTwitterLinkedInGoogle

Link: https://www.eventbank.com/event/648/
 
When Nov 22, 2016 - Nov 23, 2016
Where Bengaluru, India
Submission Deadline Aug 1, 2016
Notification Due Sep 1, 2016
Categories    cloud   security   IOT   social
 

Call For Papers

*Cloud Security Alliance APAC Congress 2016*

*Call for Papers and Presentations*

Following the success and tradition of previous CSA APAC Congress renditions, this year’s APAC Congress is the premium event for compelling presentations and interesting discussions about research, development, practice and trends related to cloud security. Attendees represent end-user, research and industry viewpoints, and there are plenty of networking and business opportunities throughout the event. If you have an idea that you would like to present and you think it would fit well into any of the conference tracks, then we would be delighted to hear from you.

*Important Dates*

- Full proposal submission Deadline: August 1st, 2016
- Notification of proposal acceptance begins: September 1st, 2016

*Conference Detail*
- Venue: Bengaluru, India
- Date: November 22 - 23, 2016

*Topics of interest*

*Track 1- New Cloud Technologies*
- Artificial intelligence used for Cloud security
- Attribute exchange platforms and networks
- Authentication and authorization
- Cloud forensics and e-discovery
- Cryptographic protocols for Cloud security
- Entertainment Industry and the Cloud
- Gaming in the Cloud
- Hypervisor security
- Identity/security as a Service
- Incident and data breach reporting obligations
- Interoperability and data portability
- New Machine Learning Methodologies
- Next generation security information and event management (SIEM)
- Privacy impact assessments
- Quantum safe cryptography
- Secure, interoperable identity in the Cloud in relation to electronic identification and trust services (eIDAS) regulation
- Security and privacy issues in social networks, big data, internet of things (IoT) and mobile Cloud
- Security frameworks for government Clouds
- Software defined network (SDN)/ Network Function Virtualization (NFV) security
- Software defined perimeter
- Trusted and trustworthy Cloud computing

*Track 2 - Mobile*
- 5G security and the Cloud
- Access control mechanisms in mobile
- Bring-your-own-device (BYOD) and mobile device management
- Cloud forensics and e-discovery
- Cloud wireless sensor networks
- Internet of Things
- Lightweight cryptographic / security mechanisms for mobile devices
- Location privacy in untrusted mobile system
- Mobile applications security
- Mobile payment
- Mobile programming and software engineering education and training
- Wearable and implantable hardware and computing

*Track 3 - Big Data*
- Big data applications
- Big Data in the Cloud
- Big Data performance analysis and large-scale deployment
- Big data privacy in cloud computing
- Big data security applications
- Big data security issues in cloud computing
- Big Data standards
- Big data storage, integration, service, mining
- Computational intelligence for big data
- Distributed file systems for Big Data
- MapReduce with cloud for big data processing
- Novel big data model
- Security, privacy, trust, and legal issues to big data
- Virtualization for big data on cloud

*Track 4 - Social*
- Cloud and Social Media
- Content analysis on Social Media
- Design and evaluation of innovative social media systems
- Disaster Management Using Social Media
- Future Social Media architecture
- Information retrieval systems and algorithms on Social Media
- Privacy and security on social networks
- Social Communication
- Social Media and Identity
- Social network child protection techniques
- Virtual reality

*Submission guidelines*
- Proposals cutting across the above topics are also encouraged.
- Proposals for presentations must be in English and should provide a learning opportunity for the conference attendees.
- In case a proposal is accepted, the author (or one of the authors) must attend.
Proposals that focus on marketing or promoting a product or service will not be considered.
- Proposals from marketing or PR professionals (external or internal) will not be considered.

*The proposal should include:*
- A brief explanatory paper (PDF format, maximum length of 2 pages).
- A draft of the presentation in PDF format (maximum 20 slides).
- A short bio of the speaker(s) and her-his previous speaking experience (PDF format, max 1 page per speaker).

*We are accepting submissions in PDF format via the Easy Chair service.
Submit your proposal in PDF file at https://easychair.org/conferences/?conf=csaapaccongress2016*

For further information please visit: https://www.eventbank.com/event/648/

Related Resources

AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [Second Round: 11 December 2020]
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
USENIX Security 2021   30th USENIX Security Symposium (Winter Deadline)
CiVEJ 2020   Civil Engineering and Urban Planning: An International Journal
CCNC 2021   IEEE Consumer Communications & Networking Conference
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics
IJCIS 2020   International Journal on Cryptography and Information Security
CCBD--Ei & Scopus 2021   2021 The 8th International Conference on Cloud Computing and Big Data (CCBD 2021)--Ei Compendex & Scopus