| |||||||||||||||
CCSP 2012 : Special Session on Cloud Computing: A Security Perspective | |||||||||||||||
Link: http://egyptscience.net/AMLTA12/files/SS-8.pdf | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for papers
=================================================================== Special Session on Cloud Computing: A Security Perspective (CCSP'12) Under the framework of the International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2012) will be held on December 8-10, 2012 in Cairo, Egypt. http://www.egyptscience.net/AMLTA12/ =========================================== ======================== = General Information = ======================== Cloud computing is one of the fast emerging fields in computing science and technology, which will have a major impact on the quality of science and research as well as human daily life over the coming years. It is a new concept based on the great achievements in computer hardware technologies, such as hardware virtualization, multi-core chips; distributed computing technologies, such as utility computing and grid computing; Internet technologies, such as SOA, Web 2.0, web services, mashups; and computer system management technologies, such as, autonomic computing and data center automation. Recently, great attentions in computation research, education, and business communities have been attracted by the concept of Cloud computing. Moreover, cloud Computing is considered as a way to centralize computation set up, implementation, maintenance, and management then to provide integrated computation to end user or business as services. The typical Cloud Computing paradigm is XaaS, such as the three foundational services, Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Despite the fact that cloud Computing has the huge potential in changing the way of computation and provides tremendous research and commercial opportunities, it also creates the great challenges in IT infrastructure, IT and information security, computation policy, industry regulation, and computation management, governance, and legislation due to the fact that clouds still subject to traditional data confidentiality, integrity, availability, and privacy issues, with addition to some other attacks. Accordingly, to seize the opportunities and to solve the challenging issues have become the great motivation in Cloud Computing education, research, and commercialization. The purpose of this session is to provide a scientific forum gathering people from academia, research, and industry for discussing the most emerging issues, recent advances, and future challenges in the area of security and privacy of cloud computing. ====================== = Topics of Interest = ====================== Topics of interest include, but are not limited to: · Cloud-delivered security services · Cryptographic protocols for cloud security · Secure data management outsourcing · Privacy and integrity mechanisms for outsourcing · Cloud-centric threat/attack/vulnerability models · Secure computation outsourcing · Trust and policy management in clouds · Trusted cloud computing technologies · Secure identity management · Business clouds and security risk models · Cost and usability models for security in clouds · Scalability of security in global-size clouds · Network security mechanisms for cloud contexts · Security for emerging cloud programming models · Energy/cost/efficiency of security in clouds · Cloud wireless sensor networks · Web 2.0, SaaS, IaaS, and PaaS cloud related security issues ========================= = Submission Guidelines = ========================= Authors are invited to submit original research contributions not concurrently submitted elsewhere (Submission system). Normal length papers should be between 8 and 10 pages, formatted in Springer’s single column format (detailed instructions for submissions are given below). Short papers should be between 5 and 7 pages. Submitted papers will be refereed by at least three reviewers for quality, correctness, originality, and relevance. Notification and reviews will be communicated via email. Papers reporting original research results and experience are solicited. Each paper, written in English, should be no more than 8 pages in the LNCS Springer style, including references and illustrations. E-submissions in PDF format are strongly recommended. Web Submission: http://www.easychair.org/conferences/conference_change_yes All accepted conference papers will be presented at the conference and included in the published proceedings by Springer's CCIS (Communications in Computer and Information Science) Series and indexed by SCOUPS and EI. Please follow the instructions on Springer's LNCS webpage http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0 when formatting to ensure that your paper is included in the proceedings (the word template can be found on the right side as a download link word.zip). =================== = Important Dates = =================== Paper Submission Deadline: July 31,2012 Acceptance Notification: August 15,2012 Camera-Ready Submission Deadline: September 15,2012 Registration Deadline: September 15,2012 ====================== = Session Organizers = ====================== *Nashwa El-Bendary Arab Academy for Science, Technology & Maritime Transport Cairo, Egypt nashwa.elbendary@ieee.org nashwa.elbendary@egyptscience.net *Qing Tan Athabasca University, School of Computing and Information Systems Canada qingt@athabascau.ca *Jinn-Shing Cheng National Kaohsiung First University of Science and Technology, Dept. of Information Management Taiwan jscheng@nkfust.edu.tw *Aboul Ella Hassanien Cairo University Faculty of Computers and Information Cairo, Egypt Abo@egyptscience.net ================================================================== ================================================================== |
|