posted by organizer: adnaneasma || 10140 views || tracked by 4 users: [display]

IWTCC 2016 : 3rd international workshop on Trust in Cloud Computing

FacebookTwitterLinkedInGoogle

Link: http://computing.derby.ac.uk/c/iwtcc2016/
 
When Dec 6, 2016 - Dec 9, 2016
Where Shanghai, China
Abstract Registration Due Sep 21, 2016
Submission Deadline Aug 5, 2016
Notification Due Sep 1, 2016
Categories    cloud computing   trust   security
 

Call For Papers

Trust is a key requirement for the successful uptake and operation of Utility and Cloud Computing (UCC). Service consumers must have belief that their data is safe and protected and service providers must provide sufficient assurances to satisfy these beliefs. However many challenges need to be overcome before this is possible. A myriad of trust relationships can arise between the different players in the UCC service delivery chain and these need to be understood and described as do the consequential assurance approaches that may be required. Complex, and varying, UCC service delivery environments may require very different and context dependent mechanisms to provide the assurances needed. This workshop aims to explore approaches to the definition and establishment of trust relationships in a dynamic and evolving UCC service environment and to investigate mechanisms, methodologies and technologies to enable the provision of assurances that are needed to fulfil users trust beliefs.

The IWTCC will be held in Shangai, China in December, 2016. It provides a forum for researchers world-wide to present their latest work in privacy, security and trust in the cloud, and to show how this research can be used to enable innovation.

Topics

We encourage submissions on theoretical as well as experimental studies related to all aspects of trust and security and privacy in the cloud. Topics of interests include, but are NOT limited to, the following categories:

Trust models in UCC.
Cryptographic techniques for privacy preservation
Identity, Authentication and key management
Formal verification for cloud architecture
Practical cryptographic protocols for cloud security
Intrusion Detection Technologies for cloud contexts
SDN Security
Provenance and digital forensics
Monitoring systems in the cloud
Remote attestation mechanisms in clouds
Trusted computing technology and clouds
Cloud Integrity and Audit
Privacy and security in Vehicular cloud
Multi-tenancy and trust in cloud computing

Related Resources

Ei/Scopus-CCNML 2025   2025 5th International Conference on Communications, Networking and Machine Learning (CCNML 2025)
IEEE-ACAI 2025   2025 IEEE 8th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Ei/Scopus-SGGEA 2025   2025 2nd Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2025)
ICCPR 2025   ACM--2025 14th International Conference on Computing and Pattern Recognition (ICCPR 2025)
Ei/Scopus-MLBDM 2025   2025 5th International Conference on Machine Learning and Big Data Management (MLBDM 2025)
AMMS 2025   ACM--2025 7th International Applied Mathematics, Modelling and Simulation Conference (AMMS 2025)
ICCCAS 2026   2026 IEEE the 15th International Conference on Communications, Circuits, and Systems (ICCCAS 2026)
ICCCBDA 2026   IEEE--2026 the 11th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2026)
BDML 2025   2025 8th International Conference on Big Data and Machine Learning (BDML 2025)--ESCI