| |||||||||||||||
IEEE BigDataSecurity 2016 : The IEEE International Conference on Big Data Security on Cloud | |||||||||||||||
Link: http://csis.pace.edu/BigDataSecurity/BigDataSecurity2016/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
CALL FOR PAPERS
======================================================================================= The 2nd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016) April. 9th-10th, 2016, New York, USA http://csis.pace.edu/BigDataSecurity/BigDataSecurity2016/ ======================================================================================= Scope and Topics of Interest: Current dramatically increasing demands of big data have driven a remarkable growth of the implementations of data mining, smart data, and data analysis in multiple domains. Security issues in applying big data have become a great concern for big data practitioners. IEEE BigDataSecurity 2016 addresses this domain and aims to gather recent academic achievements in this field. Moreover, cloud computing is the second concentration of IEEE BigDataSecurity 2016. The emerging mechanism of cloud computing has provided a variety of novel approaches addressing the solutions of big data. The new methods deriving from cloud computing have covered distinct dimensions, such as energy consumptions, high performance, and heterogeneous resources, cloud models, heterogeneous architecture, tele-health, resource allocation, load balance, multimedia, and QoS, etc. • Novel big data model • Big data security issues in cloud computing • Big data privacy in cloud computing • Big data storage, integration, service, mining • Big data security applications • Cyber hacking, next generation fire wall • Cyber monitoring, incident response • Database security, data center security • Social engineering, insider threats, advance spear phishing • Cyber threat intelligence • Security and fault tolerance for embedded or ubiquitous systems • Tele-health security in cloud computing • Sensor network security in cloud computing • Security policy and legal considerations • Cloud and networking security • Cloud computing and networking models • Virtualization for big data on cloud • MapReduce with cloud for big data processing • Heterogeneous architecture for cloud computing • Dynamic resource sharing algorithm for cloud computing • Load balance for cloud computing • Mobile cloud computing • Mobile commerce security and privacy • Green cloud computing • Embedded networks and sensor network optimizations • Cyber Security in emergent technologies Important Dates: Paper Submission: November 30th, 2015 Author Notification: January 15th, 2016 Camera-Ready: February 15th, 2016 Author Registration: February 15th, 2016 Conference Date: April 9th-10th, 2016 Submission Information: Submitted manuscripts should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column, template available at https://www.ieee.org/conferences_events/conferences/publishing/templates.html). Full Papers (up to 6 pages complimentary, or 12 pages with the over length charge), Short Papers (up to 4 pages complimentary, or 5 pages with the over length charge), and Posters (up to 1 page complimentary, or 2 pages with the over length charge) are solicited. See Instructions for authors. All paper submissions must represent original and unpublished work. Papers must be submitted electronically in PDF format through EasyChair. The accepted papers from this conference will be published by IEEE Computer Society in IEEE proceedings (indexed by EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. |
|