| |||||||||||||||
IWTCC 2018 : The 3rd International Workshop on Trust in Cloud Computing | |||||||||||||||
Link: https://computing.derby.ac.uk/c/iwtcc2018/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 3rd International Workshop on Trust in Cloud Computing
Collocated with 11th IEEE/ACM International Conference on Utility and Cloud Computing December 17-20, 2018, Zurich, Switzerland Call for papers Trust is a key requirement for the successful uptake and operation of Utility and Cloud Computing (UCC). Service consumers must have belief that their data is safe and protected and service providers must provide sufficient assurances to satisfy these beliefs. However many challenges need to be overcome before this is possible. A myriad of trust relationships can arise between the different players in the UCC service delivery chain and these need to be understood and described as do the consequential assurance approaches that may be required. Complex, and varying, UCC service delivery environments may require very different and context dependent mechanisms to provide the assurances needed. This workshop aims to explore approaches to the definition and establishment of trust relationships in a dynamic and evolving UCC service environment and to investigate mechanisms, methodologies and technologies to enable the provision of assurances that are needed to fulfil users trust beliefs. The IWTCC will be held in Zurich, Switzerland in December, 2018. It provides a forum for researchers world-wide to present their latest work in privacy, security and trust in the cloud, and to show how this research can be used to enable innovation. Topics We encourage submissions on theoretical as well as experimental studies related to all aspects of trust and security and privacy in the cloud. Topics of interests include, but are NOT limited to, the following categories: Trust models in UCC. Cryptographic techniques for privacy preservation Identity, Authentication and key management Formal verification for cloud architecture Practical cryptographic protocols for cloud security Intrusion Detection Technologies for cloud contexts SDN Security Provenance and digital forensics Monitoring systems in the cloud Remote attestation mechanisms in clouds Trusted computing technology and clouds Cloud Integrity and Audit Privacy and security in Vehicular cloud Multi-tenancy and trust in cloud computing Important dates Paper Submissions Due: 30 July, 2018 Notification of Acceptance: 15 September, 2018 Camera ready version: 30 September, 2018 Organising committees General chairs Dr. Asma Adnane, University of Derby, UK. Dr. Abir Awad, Bournemouth University, UK. Technical program committee Ashiq Anjum, University of Derby, UK. Rafael Timoteo De Sousa Junior, University of Brasilia, Brazil. Christophe Bidan, Supelec, France. Qi Shi, Liverpool John Moors University, UK. Enda Fallen, Athlone Institute of Technology, Ireland. Vasilis Katos, Bournemouth university, UK. Ryan Ko, University of Waikato, New Zealand. Khalid Al-Begain, KCST , Kuwait. Lu Liu, University of Derby, UK. Eric Filiol, ESIEA, France. Sheikh Mahbub Habib, CASED, Darmstadt, Germany. Ali Miri, Ryerson University, Canada. Kim Smith, University of Derby, UK. Maryline Laurent, Telecom SudParis, France. Kaniz Fatema, University of Derby, UK Khaled Salah, Khalifa University, UAE Theo Lynn, Dublin City University, Ireland. Bacem Bakhache, Lebanese university, Lebanon. Nizar Kheir, Thales group Kashif Kifayat, Liverpool university Nidal AlBeiruti, QA Consulting, UK Submission Paper submission : https://easychair.org/conferences/?conf=iwtcc2018 Submitted manuscripts should be structured as technical papers and may not exceed six (6) single-spaced double-column pages using 10-point size font on 8.5×11 inch pages (IEEE conference style), including figures, tables, and references. The proceedings will be published by the IEEE Computer Society and will be made available online through the IEEE Digital Library, as well as through the ACM Digital Library. Authors should submit the manuscript in PDF format. All manuscripts will be reviewed and will be judged on correctness, originality, technical strength, rigour in analysis, quality of results, quality of presentation, and interest and relevance to the conference attendees. Submitted papers must represent original unpublished research that is not currently under review for any other conference or journal. |
|