posted by user: bigheaddavid || 9932 views || tracked by 10 users: [display]

IWCSF 2015 : The International Workshop on Cloud Security and Forensics

FacebookTwitterLinkedInGoogle

Link: http://cms.uhd.edu/faculty/yuans/research/IWCSF-2015.htm
 
When Nov 2, 2015 - Nov 4, 2015
Where Shenzhen
Submission Deadline Sep 10, 2015
Notification Due Sep 21, 2015
Final Version Due Oct 1, 2015
Categories    cloud   security   digital forensics
 

Call For Papers

Direct paper submission link: https://edas.info/newPaper.php?c=20983&track=74419

Cloud computing is an emerging yet revolutionary technology. It has started changing the ways people live and work. With the rapid growth of cloud and related services, security and privacy in the Cloud have become increasingly critical issues in the research realm of communications and networks security. The introduction of cloud in existing computer systems and networks has changed the security perspectives and measures, consequently affecting how crime related digital evidence is retrieved, processed, and presented in this environment.
The International Workshop on Cloud Security and Forensics (IWCSF 2015), aptly named for its goals, is a one-day research workshop organized with the objective of bringing together top researchers working on the intersection of the Security of Cloud computing and storage as well as cyber forensics and cyber law to present and discuss their latest research results and ideas, thereby promoting the development and the evolution of this combined body of knowledge. All submissions enabling cross-pollination of ideas on cloud security, cloud privacy, cloud forensics, cyber law, and eDiscovery are welcome. IWCSF 2015 encourages and accepts novel, innovative, and previously unpublished works. Topics include, but are not limited to:

· Infrastructure Cloud Security
· Data and Storage Security in Cloud
· Cloud Access Control
· Cloud Security Management
· Security Hacking and Countermeasures in the Cloud
· Cloud Risk Management and Disaster Recovery
· Cloud Auditing and Compliance
· Security As a Cloud Services
· Mobile Cloud Security and Privacy
· Cyber Law and Terrorism in the Cloud
· Cloud Forensics Process and Models
· Cloud Forensic Data Acquisition
· Cloud Digital Evidence Management
· Cloud Auditing and Compliance
· Cloud Digital Evidence Analysis and Presentation
· Mobile and Wireless Cloud Forensics
· Cloud eDiscovery

The workshop organizers cordially invite submissions of original research work to The International Workshop on Cloud Security and Forensics (IWCSF 2015), in conjunction with The 2015 IEEE/CIC International Conference on Communications in China, to be held on November 2-4, 2015 in Shenzhen, China. Listed below is important information of the workshop and more information of the workshop can be found here http://cms.uhd.edu/faculty/yuans/research/IWCSF_2015.htm. Paper formatting and submission instructions can be found at the 2015 IEEE ICCC website http://www.ieee-iccc.org/submguide.html.
Workshop Organizers
· Shengli Yuan, Ph.D., Associate Professor, Department of Computer Science and Engineering Technology, University of Houston-Downtown; One Main St. Houston, TX 77002, USA; yuans@uhd.edu; Phone: 1-(713) 221-8572; Fax: 1-(713)-223-7407. (primary contact)

· Lei Chen, Ph.D., Associate Professor, Department of Information Technology, Georgia Southern University; P.O. BOX 8150, Statesboro, GA 30460, USA; lchen@georgiasouthern.edu; Phone: 1-(912) 478-5363; Fax: 1-(912) 478-7883.


Important Dates and Location
Workshop: November 1, 2015
Location: Shenzhen, China (venue to be announced)
Paper Due: September 10, 2015
Paper Notification: September 21, 2015
Camera-ready Paper Due: October 1, 2015
Tentative List of Technical Program Committee (TPC) Members
• Dr. Irfan Ahmed, University of New Orleans, USA

• Dr. Lei Chen, Georgia Southern University, USA

• Dr. Song Fu, University of North Texas, USA

• Dr. Lila Ghemri, Texas Southern University, USA
• Dr. Guofei Gu, Texas A&M University, USA

• Dr. Wen-Chen Hu, University of North Dakota, USA

• Dr. Yiming Ji, University of South Carolina Beaufort, USA

• Dr. Wei Wayne Li, Texas Southern University, USA
• Dr. Zhiqiang Lin, University of Texas at Dallas, USA

• Dr. Hassan Takabi, University of North Texas, USA

• Dr. Jie Wu, Temple University, USA

• Dr. Chengjun Wang, Vermont Technical college, USA

• Dr. Shaoen Wu, Ball State University, USA

• Dr. Gongjun Yan, University of Southern Indiana, USA

• Dr. Qing Yang, Montana State University, USA

• Dr. Ming Yang, Kennesaw State University, USA

• Dr. Shengli Yuan, University of Houston-Downtown, USA

▪ Mr. Dongyup Han, Georgia Southern University

Related Resources

IEEE ICICN 2026   2026 IEEE 14th International Conference on Information and Communication Networks (ICICN 2026)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
ICITS--EI 2026   2026 The 14th International Conference on Information Technology and Science (ICITS 2026)
IJSPTM 2026   International Journal of Security, Privacy and Trust Management
ICFCC 2026   2026 The 18th International Conference on Future Computer and Communication (ICFCC 2026)
ICSEA 2026   The Twenty-First International Conference on Software Engineering Advances
WCSE 2026   2026 The 16th International Workshop on Computer Science and Engineering (WCSE 2026)
IoT-Life 2026   2026 The 1st International Conference on Intelligent loT and Smart Life for Human Well-Being
BDCI 2026   2026 The 6th International Conference on Big Data and Computational Intelligence (BDCI 2026)
IJASA 2026   The International Journal of Ambient Systems and applications