| |||||||||||||||
WCSF 2016 : International Workshop on Cloud Security and Forensics (Co-located with the Sixth International Conference on Innovating Computing Technology INTECH 2016) | |||||||||||||||
Link: http://www.dirf.org/intech/workshops/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
(Technically co-sponsored by UK & Ireland IEEE)
(Xplore publishing) Cloud computing offers utility oriented Information and Communications Technology (ICT) services to users all over the world. The evolution of cloud computing is driving the design of data centres by architecting them as networks of virtual services; this enables users to access and run applications from anywhere in the world. As the prevalence and usage of networked cloud computer systems increases, logically the security of these systems can pose significant security concerns and the likelihood of these systems being used for criminal behaviour also increases. Thus, this new computing evolution has a direct effect on, and creates challenges for, cyber security and digital forensic practitioners. The field of digital forensics has grown rapidly over the last decade due to the rise of the Internet and associated crimes; however while the theory is well established, the practical application of the discipline is still new and developing. Law enforcement agencies can no longer rely on traditional digital forensic methods of data acquisition through device seizure to gather relevant evidence pertaining to an investigation from cloud sources. Using traditional digital forensic methods will lead to the loss or overlooking of valuable evidential material hosted on cloud--based infrastructures.Cloud computing and its impact on digital forensics will continue to grow and traditional digital forensics methods are inadequate for cloud forensic investigations. Topics of interest comprise but are not limited to: Cloud Forensics and e-Discovery Intrusion and Attack Readiness Cloud Cryptography Data centre and Data Security Big Data Forensics Security and Privacy for Cloud Computing Trust and Policy Management Case Studies of Cloud--based Attacks Cloud Data Recovery Private Cloud Security Network Security and Forensics Mobile Cloud Security and Forensics Forensics GIS Submission: The INTECH proceedings will be indexed in IEEE Xplore, dblp and other databases. The submission guidelines for the workshop will be like the main conference. Authors can refer the template in the main conference page. Journal Publication: The WCSF workshop papers are also considered for post-conference journal publications. Submissions link: https://easychair.org/conferences/?conf=wcsf2016 |
|