| |||||||||||||||||
CSEE 2014 : Mini track on Cloud Security within Emerging Environments | |||||||||||||||||
Link: http://academic-conferences.org/iccsm/iccsm2014/iccsm14-call-papers.htm#Lagesse | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
This mini-track is being hosted at the 2nd International Conference on Cloud Security Management (ICCSM 2014).
Many new systems are emerging beyond traditional desktop computing such as sensor systems, mobile systems, vehicular network systems, and wearable computing systems. These emerging environments are often mobile, ad-hoc, and consist of resource constrained devices. Cloud computing presents an opportunity for emerging systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of emerging systems, there are security limitations of leveraging cloud computing that must be addressed. It is essential that cloud-based emerging systems be secured holistically from the beginning to ensure secure storage, transport, and access to information throughout the entire cloud-based environment. This mini-track invites submissions pertaining to the above-mentioned issues; suggested topics include but are not limited to:. Android security Pervasive System Security Private and Ad-hoc Clouds Securing the interfaces between clouds and emerging systems Privacy Utilizing cloud computing to enhance security of resource constrained devices Security models and architectures for integrating cloud computing with emerging systems |
|