| |||||||||||
ICT-BDCS 2015 : 6th Annual International Conference on ICT: Big Data, Cloud and Security (ICT: BDCS 2015) | |||||||||||
Link: http://bigdataclouds.org/index.html | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
CONFERENCE THEME
The Annual International Conference on ICT : Big Data , Cloud and Security (ICT-BDCS 2015) serves as a platform for industry professionals, academics, researchers, scientists, consultants and policy makers to interact and discuss various issues in big data, cloud computing and IT security. The conference will provide an opportunity for the participants to exchange novel ideas and new research developments in the field of cloud computing, big data and IT security in today’s ubiquitous and virtual environment. CALL FOR PAPERS The topics of interest include, but are not limited to: Theme 1: Big Data Theme 2: Cloud Computing and Virtualization • Architectures for Big Data • Infrastructure, Platform, Application, Business, Social, and Mobile Clouds • Big Data Analytics • Storage, Data, and Analytics Clouds • Scaling Big Data • Cloud Computing Architectures • Big Data Economics • Self-service Cloud Portal, Dashboard, and Analytics • Predictive Analytics • Cloud Solution Design Patterns • Object Storage for Big Unstructured Data • Security, Privacy, and Compliance Management in Clouds • Federal Big Data • Cloud Configuration, Performance, and Capacity Management • Big Data Tools Landscape • Service Level Agreement (SLA) • Big Data & Virtualization • Cloud Migration • Big Data & Security • Cloud Software Patch and License Management • The Rise of Database Sharing • Cloud Resource Virtualization and Composition • Big Data Search • Cloud Workload Profiling and Deployment Control • Big Data & Bioinformatics • High Performance Cloud Computing • Green Cloud Computing • Economic, Business and ROI Models for Cloud Computing Theme 3: Information and Network Security Theme 4: Cryptography and Algorithms • Malwares • Cryptographic Algorithms, Hash Functions • Business Continuity & Disaster Recovery Planning • Cryptographic Primitives and Security Protocols • Insider Threats • Digital Signatures • Hacking and Defending • Key Distribution and Management • Intrusion Detection and Prevention • Analysis of Security Protocols • Firewalls • Privacy, Anonymity and Traceability • Network Security Policies: Implementation and Management • Identity Management • High Performance Security Systems • Provable Security • SAN/NAS Security • Secure System Implementation • Database and System Security • Secure Operating Systems Theme 6: Multimedia Security • Internet Security & Applications • Web Security, Web Services and Enterprise Security • Image, Audio and Video Encryption Mechanisms • Access Controls and Security Mechanisms • Digital Rights Management • Network Monitoring • Steganography and Digital Watermarking • Secure Routing and Network Management • Multimedia Forensics • Security in Content Delivery Networks • Security of VOIP and multimedia • Security in High Speed Network • Privacy and Security in Surveillance Videos • Security in Optical Systems and Networks • Intelligent Multimedia Security Services • Cyber Security • Physical Security Theme 7: Cloud and Grid Security Theme 5: Security and Privacy Issues in Networks • Security, Privacy and Cryptography in Clouds • Service-Oriented Architecture and Cloud Computing • Mobile Networks • Virtualization Trends & Challenges for Cloud Computing • Ad Hoc Networks • Programming Models and Systems/Tools • VANET Networks • Design Tool for Cloud Computing • Sensor Networks • Green Cloud Computing & Economics of the Cloud • P2P Networks • Monitoring, Management and Maintenance of Clouds • Social Networks • Quality of Service (QoS) in Cloud Computing • Satellite Networks • Performance Improvements for Cloud Computing • Wireless Networks • E-Governance and E-commerce • Internet of Things |
|