posted by user: sparkins || 103 views || tracked by 1 users: [display]

CCSTIM 2017 : International Workshop on Cloud Computing Security: Threats, Intelligence, and Mitigation

FacebookTwitterLinkedInGoogle

Link: https://selene.hud.ac.uk/scomsp2/CCSTIM/
 
When Dec 5, 2017 - Dec 8, 2017
Where Austin, Texas, USA
Submission Deadline Jul 31, 2017
Notification Due Jul 27, 2017
Final Version Due Sep 30, 2017
Categories    security   cloud   computing   artificial intelligence
 

Call For Papers

International Workshop on Cloud Computing Security: Threats, Intelligence, and Mitigation (CCSTIM)
In conjunction with the 10th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Austin, TX, USA.

5-8 December 2017

Venue:
AT&T Conference Center, 1900 University Avenue, Austin, TX, USA.

Aim and Scope:
The cloud computing paradigm enables the sharing of computing resources for users to enjoy readily available cloud applications and services without the consumption of local resources. The number of connected devices is continually increasing, and thus is the infrastructure on which they operate. The unique attributes of cloud systems results in the introduction of many security and privacy challenges, which are further exacerbated by new developments in infrastructure and software. This workshop is a forum to bring together researchers and practitioner to discuss the latest advancements in cloud security threats, the development of novel countermeasures, and the necessity to prevent cyber threats through security-by-design.

Topics include but not restricted to:

Identification and analysis of security threats facing cloud and fog systems
Security-by-design in connected systems
The identification of security vulnerabilities and the assessment of new threats
Vulnerabilities patch and legacy applications management
Secure data management and outsourcing
Data privacy and privacy enabling mechanisms
Virtualisation security and sandboxing
Trusted computing technologies
Secured data sharing and communication among hybrid clouds
Security and identify management mechanisms
Secure programming models and the 'secure-by-design' philosophy
Security scalability for cloud and fog systems
System availability, recovery and auditing in a security context
Novel Intrusion Detection Systems (IDS)
Incident response and breach prevention technologies
Use of Artificial Intelligence within cloud and fog security
Human factors of cloud and fog security
Data privacy and security, including cryptography
Target Audience
This workshop will be of interest to both the research and practitioner working in the cloud security field. This workshop is unique positioned as the support provided by organisations working in the sector of cloud security will provide a strong real-world emphasis, enabling academics to disseminate their work with impact, and industrial practitioners to leverage state-of-the-art techniques.

The involvement of organisations in supporting and promoting the workshop will bring credibility and attract other leading organisations and academics.
Paper Submission
Authors are encouraged to submit high-quality, original work that has neither appeared in, nor is under consideration by, other conferences and journals.

The length of the papers should not exceed 6 pages (IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced), including figures and references, using font size 10, and number each page. All papers will be peer reviewed and the comments will be provided to the authors. The accepted papers will be published in the main proceedings of the IEEE/ACM UCC 2017 by the IEEE Computer Society Press and indexed by EI. At least one of the authors of their accepted paper is requested to register the paper and present the work in the IEEE/ACM UCC 2017.

Authors are encouraged to submit high-quality, original work that has neither appeared in, nor is under consideration by, other conferences and journals. All papers will be peer reviewed and the comments will be provided to the authors.

IEEE Computer Society Proceedings template is available at the following web page: [URL]

Submission will be handled through EasyChair. Please find the submission link: [URL]

Important Dates
Deadline for paper submission: 31 July, 2017
Notifications to authors: 27 August, 2017
Camera ready papers: 30 Sepetmeber, 2017
Early Registration Due: 30 Sepetmeber, 2017

Organising Committee:
Dr Simon Parkinson
Dr Louie Qin
Prof Andrew Crampton

Programme Committee
Dimitrios Zissis, University of the Aegean, Greece
Dean Hardcastle, NCC Group, Sydney
Saad Khan, University of Huddersfield, UK
Marjan Gusev, Saints Cyril and Methodius University of Skopje, University in Skopje, Republic of Macedonia
Sasko Ristov, Saints Cyril and Methodius University of Skopje, University in Skopje, Republic of Macedonia
Contact:
All questions about submissions and this workshop should be emailed to Simon Parkinson ccstim17@easychair.org .

Related Resources

IJCAI 2019   International Joint Conference on Artificial Intelligence
ADON 2018   International Workshop on Anomaly Detection ON the Cloud and the Internet of Things
ICML 2019   36th International Conference on Machine Learning
ICDMML 2019   【ACM ICPS EI SCOPUS】2019 International Conference on Data Mining and Machine Learning
KLP@SAC 2019   Knowledge and Language Processing Track @ The 34th ACM Symposium on Applied Computing - ACM SAC 2019
SeTM 2019   Security and Trust in Mobile Network 2019
CAIP 2019   Computer Analysis of Images and Patterns
ISCSAI 2018   2018 International Symposium on Computer Science and Artificial Intelligence
IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
SSCI 2019   The 2019 IEEE Symposium Series on Computational Intelligence