| |||||||||||||
C&TC 2016 : CALL FOR PAPERS - 6th International Symposium on Secure Virtual Infrastructures - Cloud and Trusted Computing (C&TC 2016) | |||||||||||||
Link: http://otmconferences.org/index.php/conferences/ctc-2016 | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
[Apologies if you receive multiple copies of this message]
========================================================================== CALL FOR PAPERS 6th International Symposium on Secure Virtual Infrastructures -- Cloud and Trusted Computing (C&TC 2016) October 24-28, 2016 -- Rhodes, Greece http://otmconferences.org/index.php/conferences/ctc-2016 ========================================================================== ================== Special Theme 2016 ================== Secure and Trustworthy Cloud, Big Data, and Data-Intensive Applications =========== Description =========== Current and future software needs to remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for internet-based and intranet-based systems in organizations. Today, software covers a very wide range of application domains as well as technology and research issues. This has found realization through Cloud Computing, Big Data, and data intensive applications. Vital element in such networked information systems are the notions of trust, security, privacy and risk management. Cloud and Trusted Computing (C&TC 2016) is the 6th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as a component conference of the OnTheMove Federated Conferences & Workshops. C&TC 2016 will be held in Rhodes, Greece. The conference solicits submissions from both academia and industry presenting novel research in the context of Cloud Computing, Big Data, and data intensive applications, presenting theoretical and practical approaches to cloud and big data trust, security, privacy and risk management. The conference will provide a special focus on the intersection between cloud, big data, and trust bringing together experts from the three communities to discuss on the vital issues of trust, security, privacy and risk management in Cloud Computing, shedding the light on novel issues and requirements in big data domains. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. This year, for the 20th anniversary of the CoopIS conference, C&TC 2016 also welcomes additional submissions discussing the adoption of cooperative systems for increasing cloud trust and achieve autonomic integration. We also welcome review papers that analyze critically the current status of trust, security, privacy and risk management in the cloud. Papers from practitioners who encounter trust, security, privacy, and risk management problems, and seek understanding are finally welcome. =========== Topics =========== For 2016, a special emphasis will be put on ìSecure and Trustworthy Cloud, Big Data, and Data-Intensive Applicationsî. The following themes to be addressed by novel research have been identified: TRUST, SECURITY, PRIVACY AND RISK MANAGEMENT - Assurance Techniques - Access Control, Authorization, and Authentication - Big data security and privacy - Cloud Computing with Autonomic and Trusted Environment - Cooperative systems - Cryptographic Algorithms and Protocols - Cyber Attack, Crime and Cyber War - DRM, Watermarking Technology, IP Protection - Emergency and Security Systems - End-to-end security over complex cloud supply chain - Forensics - Human Interaction with Trusted and Autonomic Computing Systems - Identity and Trust Management - Multimedia Security Issues over Mobile and Wireless Clouds - Network Security - Networks of Trust, Clouds of Trust - Privacy, Anonymity - Privilege Management Infrastructure - Reliable Computing and Trusted Computing - Risk evaluation and Management - Security, Dependability and Autonomic Issues in Ubiquitous Computing - Security Models and Quantifications - Self-protection and Intrusion-detection in Security - Trust Evaluation and Prediction in Service-Oriented Environments - Trust, Security, Privacy and Confidentiality - Trust in big data analytics - Trusted Computing in virtualized environments - Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS - Virus Detections and Anti-virus Techniques/Software DATA MANAGEMENT - Algorithms and Computations on Encrypted Data - Big Data, Frameworks and Systems for Parallel and Distributed Computing - Big Data Processing and Analytics - Big Data Preparation - Big Data Representation - Big Data Visualization- Database as a Service, Multi-tenancy, Data management and analytics as a service - Data Integrity - Data Science and Scalable Machine Learning - Elasticity and Scalability for Cloud Data Management Systems - High Availability and Reliability - Interoperability between Clouds- New Protocols, Interfaces and Data Models for Cloud Databases - Resource and Workload Management in Cloud Databases - Service Level Agreements and Contracts - Transactional Models for Cloud Databases, Consistency and Replication - Threats and countermeasures - Virtualization and Cloud databases, Storage Structures and Indexing INFRASTRUCTURES AND ARCHITECTURES - Autonomic Computing Theory, Models, Architectures and Communications - Big Data Infrastructures - Cloud Resource provisioning with QoS Guarantees - Cloud Operation and Resource Management - Cloud Performance Modeling and Benchmarks - Datacenter Architecture and Management - Formal methods and Tools for Cloud computing - Infrastructures for Social Computing and Networking - NoSQL Databases - Software Architectures and Design for Trusted Emerging Systems - Virtualized Computing Infrastructures APPLICATIONS - Big Data Applications and Case Studies - Cloud Business Applications and Case Studies - Clouds and Social Media, Network and Link Analysis - Data Intensive Applications - Large Scale Cloud Applications, Reality Mining - Mobile Cloud Services - New Parallel/Concurrent Programming Models for Cloud Computing - Pervasive/Ubiquitous Computing in the Cloud - Reliability, Fault Tolerance, Quality-of-Service - Service Level Agreements and Performance Measurement - Service-Oriented Architectures, RESTful Services in Cloud Environments =============== Important Dates =============== - Abstract Submission Deadline: June 28, 2016 - Paper Submission Deadline: July 14, 2016 - Acceptance Notification: August 13, 2016 - Camera Ready Due: August 30, 2016 - Author Registration Due: August 30, 2016 ================ Paper Submission ================ FULL PAPERS Regular paper submissions to Cloud and Trusted Computing 2016 (C&TC 2016) must present original, highly innovative, prospective and forward-looking research in one or more of the themes given above. Full papers must break new ground, present new insight, deliver a significant research contribution and provide validated support for its results and conclusions. Successful submissions typically represent a major advance for the fields of cloud computing and big data, referencing and relating the contribution to existing research work, giving a comprehensive, detailed and understandable explanation of a system, study, theory or methodology, and support the findings with a compelling evaluation and/or validation. Each paper must be submitted as a single PDF file in Springer Lecture Notes in Computer Science format (no longer than 18 pages in length). Accepted regular papers will be included in the printed conference main proceedings and presented in the paper sessions. Submissions to C&TC 2016 must not be under review by any other conference or publication at any time during the C&TC review cycle, and must not be previously published or accepted for publication elsewhere. NOTES Short papers (not longer than 6 pages in length) must report new results and provide support for the results, as a novel and valuable contribution to the field ñ just like full papers. Short papers are intended for succinct work that is nonetheless in a mature state ready for inclusion in archival proceedings. Short papers will be held to the same standard of scientific quality as full papers, albeit for a shorter presentation, and must still state how they fit with respect to related work, and provide a compelling explanation and validation. Short papers must be submitted as single PDF file in Springer Lecture Notes in Computer Science format. Accepted short papers will be published in the conference main proceedings and will be presented in the paper sessions of the conference. We plan a journal special issue for which we will invite the best papers (to be confirmed). Paper submission site: http://otmconferences.org/index.php/paper-submission PAPER FORMATTING AND PRESENTING The paper and notes submission site giving all the relevant submission details is located at: http://otmconferences.org/index.php/paper-submission/authors-kit. Failure to comply with the formatting instructions for submitted papers or notes will lead to the outright rejection of the paper without review. Failure to commit to presentation at the conference automatically excludes a paper from the proceedings. =============== Program Chairs =============== - Claudio Agostino Ardagna, Universita' degli studi di Milano, Italy - Nils Gruschka, Fachhochschule Kiel, Germany ================== Advisory Committee ================== - Michele Bezzi, SAP France, France - Ernesto Damiani, Universita' degli studi di Milano, Italy - Meiko Jensen, Unabh‰ngiges Landeszentrum f¸r Datenschutz Schleswig-Holstein, Germany - Salim Hariri, The University of Arizona, USA - Robert Meersman, TU Graz, Austria - HervÈ Panetto, University of Lorraine, Nancy, France ================= Program Committee ================= - Omar Alfandi, Zayed University, UAE - Marco Anisetti, Universit‡ degli Studi di Milano, Italy - Rasool Asal, British Telecommunications, UK - N Balakrishnan, Indian Institute of Science, India - Jens-Matthias Bohli, NEC Laboratories Heidelberg, Germany - Marco Casassa Mont, HP Labs, UK - Alfredo Cuzzocrea, University of Calabria, Italy - Ernesto Damiani, Universit‡ degli Studi di Milano, Italy - Francesco Di Cerbo, SAP Labs, France - Scharam Dustdar, Technical University of Vienna, Austria - Nabil El Ioini, Free University of Bozen, Italy - Atsuhiro Goto, Institute of Information Security, Japan - Stefanos Gritzalis, University of the Aegean, Greece - Marit Hansen, Unabh‰ngiges Landeszentrum f¸r Datenschutz Schleswig-Holstein, Kiel, Germany - Martin Jaatun, SINTEF ICT, Norway - Meiko Jensen, Unabh‰ngiges Landeszentrum f¸r Datenschutz Schleswig-Holstein, Kiel, Germany - Gwanggil Jeon, Incheon National University, South Korea - Luigi Lo Iacono, TH Koln, Germany - Claus Pahl, Free University of Bozen, Italy - Siani Pearson, HP Labs, UK - Khaled Salah, Khalifa University, Abu Dhabi, UAE - Damien Sauveron, UniversitÈ de Limoges, France - Stefan Schulte, Technical University of Vienna, Austria - Jorg Schwenk, Ruhr-Universitat Bochum, Germany - Luca ViganÚ, King's College London, UK TO BE COMPLETED =============== Publicity Chair =============== - Nabil El Ioini, Free University of Bozen, Italy More information available at http://otmconferences.org/index.php/conferences/ctc-2016 |
|