| |||||||||||||||
MidCCI 2015 : MidCCI 2015: 1st IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking | |||||||||||||||
Link: http://www.computer.org/web/compsac/midcci | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
MidCCI 2015: 1st IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking
In Conjunction with COMPSAC 2015, Taichung, Taiwan - July 1-5, 2015 MidCCI aims to share experiences of developing and managing middleware from both technical and policy aspects. It aims to bring together application developers and middleware and security experts to identify areas of overlap and best practice so that the development of solutions can be simple and ideally modular in nature, to ensure applications can be developed quickly and easily whilst conforming to middleware and security standards. This workshop started as the Middleware Architecture in the Internet (MidArch) workshop in 2007. After holding the 8th workshop, co-located with COMPSAC 2014, it was decided to change the workshop name as Middleware for Cyber Security, Cloud Computing and Internetworking (MidCCI), considering the change in situation surrounding Internet middleware. This workshop carries over the aims from the past MidArch workshops. Middleware is a layer of software that acts as glue between applications and the Internet. Although it is somehow difficult to define what middleware is (see RFC2768), it provides fundamental services in various situations, such as authentication, authorization, accounting, directories, resource management, information discovery and retrieval, and security. Middleware solutions are starting to mature with a number of frameworks emerging that should ideally make use of common reusable components and tools to deliver specific middleware services for communities such as researchers in GRID/cloud communities, and teaching and learning in higher education. In addition to technical and policy aspects of middleware development and management, papers on system development and experiences are also welcome. When such a paper is submitted, please include "Implementation" or "Experiences" in the keyword list of the paper. - The scope of MidCCI includes but is not limited to: Authentication, authorization, accounting and access management Single sign on for Web services and non-web applications Federations & trust fabrics (technologies and policies) Wireless network roaming architectures DNS and directory services Hypervisor (VMware, Xen, KVM, ...) Academic cloud Cloud computing platform (OpenStack, CloudStack, ...) Frameworks for distributed processing (Hadoop, Jubatus, ...) Middleware for SDN and NFV (Open vSwitch, OpenFlow Controllers, ...) Middleware for Information-Centric Networking Middleware for overlay networking Network simulators and emulators Secure computing Countermeasures against Advanced Attacks E-mail digital signature and encryption (S/MIME, PGP, etc.) PKI deployment issues Security policies Big data/Cloud/GRID access control and privacy protection Implementation/Experiences of middleware. Authors are invited to submit original, unpublished research papers as well as industrial practice papers. Simultaneous submissions to other publications and conferences are not permitted. The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person. - Workshop Organizers: Hideaki Goto, Associate Professor, Tohoku University, Japan Shuo-Yan Chou, Professor, National Taiwan University of Science and Technology, Taiwan Toyokazu Akiyama, Associate Professor, Kyoto Sangyo University, Japan - Program Committee: Atsushi Kanai (Hosei University, Japan) Diego R. Lopez (Telefonica I+D, Spain) Guido Aben (AARNet, Australia) Hideaki Goto (Tohoku University, Japan) Hideaki Sone (Tohoku University, Japan) Hiroyuki Sato (The University of Tokyo, Japan) Jiann-Liang Chen (National Taiwan University of Science and Technology, Taiwan) Kento Aida (National Institute of Infomatics, Japan) Mikael Linden (CSC, Finland) Motonori Nakamura (National Institute of Informatics, Japan) Muhammad Farhan Sjaugi (Perdana University, Malaysia) Nariyoshi Yamai (Tokyo University of Agriculture and Technology, Japan) Shigeaki Tanimoto (Chiba Institute of Technology, Japan) Shoji Kajita (Kyoto University, Japan) Shuo-Yan Chou (National Taiwan University of Science and Technology, Taiwan) Stefan Winter (RESTENA, Luxembourg) Suhaimi Napis (Universiti Putra Malaysia, Malaysia) Toru Kobayashi (Nagasaki University, Japan) Toyokazu Akiyama (Kyoto Sangyo University, Japan) Yasuo Okabe (Kyoto University, Japan) Yoshiaki Seki (Tokyo City University, Japan) |
|