posted by user: mickeylaw || 12462 views || tracked by 7 users: [display]

CSAAPACCON 2016 : Cloud Security Alliance APAC Congress 2016

FacebookTwitterLinkedInGoogle

Link: https://www.eventbank.com/event/648/
 
When Nov 22, 2016 - Nov 23, 2016
Where Bengaluru, India
Submission Deadline Aug 1, 2016
Notification Due Sep 1, 2016
Categories    cloud   security   IOT   social
 

Call For Papers

*Cloud Security Alliance APAC Congress 2016*

*Call for Papers and Presentations*

Following the success and tradition of previous CSA APAC Congress renditions, this year’s APAC Congress is the premium event for compelling presentations and interesting discussions about research, development, practice and trends related to cloud security. Attendees represent end-user, research and industry viewpoints, and there are plenty of networking and business opportunities throughout the event. If you have an idea that you would like to present and you think it would fit well into any of the conference tracks, then we would be delighted to hear from you.

*Important Dates*

- Full proposal submission Deadline: August 1st, 2016
- Notification of proposal acceptance begins: September 1st, 2016

*Conference Detail*
- Venue: Bengaluru, India
- Date: November 22 - 23, 2016

*Topics of interest*

*Track 1- New Cloud Technologies*
- Artificial intelligence used for Cloud security
- Attribute exchange platforms and networks
- Authentication and authorization
- Cloud forensics and e-discovery
- Cryptographic protocols for Cloud security
- Entertainment Industry and the Cloud
- Gaming in the Cloud
- Hypervisor security
- Identity/security as a Service
- Incident and data breach reporting obligations
- Interoperability and data portability
- New Machine Learning Methodologies
- Next generation security information and event management (SIEM)
- Privacy impact assessments
- Quantum safe cryptography
- Secure, interoperable identity in the Cloud in relation to electronic identification and trust services (eIDAS) regulation
- Security and privacy issues in social networks, big data, internet of things (IoT) and mobile Cloud
- Security frameworks for government Clouds
- Software defined network (SDN)/ Network Function Virtualization (NFV) security
- Software defined perimeter
- Trusted and trustworthy Cloud computing

*Track 2 - Mobile*
- 5G security and the Cloud
- Access control mechanisms in mobile
- Bring-your-own-device (BYOD) and mobile device management
- Cloud forensics and e-discovery
- Cloud wireless sensor networks
- Internet of Things
- Lightweight cryptographic / security mechanisms for mobile devices
- Location privacy in untrusted mobile system
- Mobile applications security
- Mobile payment
- Mobile programming and software engineering education and training
- Wearable and implantable hardware and computing

*Track 3 - Big Data*
- Big data applications
- Big Data in the Cloud
- Big Data performance analysis and large-scale deployment
- Big data privacy in cloud computing
- Big data security applications
- Big data security issues in cloud computing
- Big Data standards
- Big data storage, integration, service, mining
- Computational intelligence for big data
- Distributed file systems for Big Data
- MapReduce with cloud for big data processing
- Novel big data model
- Security, privacy, trust, and legal issues to big data
- Virtualization for big data on cloud

*Track 4 - Social*
- Cloud and Social Media
- Content analysis on Social Media
- Design and evaluation of innovative social media systems
- Disaster Management Using Social Media
- Future Social Media architecture
- Information retrieval systems and algorithms on Social Media
- Privacy and security on social networks
- Social Communication
- Social Media and Identity
- Social network child protection techniques
- Virtual reality

*Submission guidelines*
- Proposals cutting across the above topics are also encouraged.
- Proposals for presentations must be in English and should provide a learning opportunity for the conference attendees.
- In case a proposal is accepted, the author (or one of the authors) must attend.
Proposals that focus on marketing or promoting a product or service will not be considered.
- Proposals from marketing or PR professionals (external or internal) will not be considered.

*The proposal should include:*
- A brief explanatory paper (PDF format, maximum length of 2 pages).
- A draft of the presentation in PDF format (maximum 20 slides).
- A short bio of the speaker(s) and her-his previous speaking experience (PDF format, max 1 page per speaker).

*We are accepting submissions in PDF format via the Easy Chair service.
Submit your proposal in PDF file at https://easychair.org/conferences/?conf=csaapaccongress2016*

For further information please visit: https://www.eventbank.com/event/648/

Related Resources

BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICICSE 2025   IEEE--2025 the 5th International Conference on Information Communication and Software Engineering (ICICSE 2025)
ICDPA 2025   2025 The 11th International Conference on Data Processing and Applications (ICDPA 2025)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
COIT 2025   5th International Conference on Computing and Information Technology
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
ccpi 2025   16th International Workshop on Cloud-Edge Continuum Projects and Initiatives (CCPI)
EEIJ 2024   Electrical Engineering: An International Journal