posted by user: dnsl || 10259 views || tracked by 13 users: [display]

ICDCS-SPCC 2012 : The 3rd International Workshop on Security and Privacy in Cloud Computing


When Jun 18, 2012 - Jun 21, 2012
Where Macau, China
Submission Deadline Jan 8, 2012
Notification Due Feb 22, 2012
Final Version Due Mar 3, 2012
Categories    security   privacy   cloud

Call For Papers

Call For Paper: ICDCS-SPCC 2012

The 3rd International Workshop on Security and Privacy in Cloud Computing,
in conjunction with ICDCS 2012, Macau, China, June 18-21, 2012

Cloud computing has recently emerged as a new information technology infrastructure. Cloud computing has unique attributes that raise many security and privacy challenges in areas such as data security, recovery, and privacy, as well as legal issues in areas such as regulatory compliance and auditing. In contrast to traditional enterprise IT solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the servers in large data centers on the Internet, where the management of the data and services are not fully trustworthy. When clients store their data on the server without themselves possessing a copy of it, how the integrity of the data can be ensured if the server is not fully trustworthy? Will encryption solve the data confidentiality problem of sensitive data? How will encryption affect dynamic data operations such as query, insertion, modification, and deletion? Data in the cloud is typically in a shared environment alongside data from other clients. How the data segregation should be done, while data are stored, transmitted, and processed? Due to the fundamental paradigm shift in cloud computing, many security concerns have to be better understood, unanticipated vulnerabilities identified, and viable solutions to critical threats devised, before the wide deployment of cloud computing techniques can take place.

We are soliciting both full papers that present relatively complete and mature research results and short position papers that report work-in-progress but inspiring and intriguing new ideas. Topics of interests include (but are not limited to) the following subject categories:

Secure cloud architecture

Cloud access control and key management

Identification and privacy in cloud

Remote data integrity protection

Dynamic data operation security

Software and data segregation security

Secure management of virtualized resources

Joint security and privacy aware protocol design

Failure detection and prediction

Secure data management in/across data centers

Availability, recovery and auditing

Secure wireless cloud

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing, and Short Research Papers that describe work-in-progress ideas are also welcome. Research Papers and Position Papers will be reviewed separately.

Time Line and Paper Submission:

Manuscript submission: January 8, 2012

Acceptance notification: February 22, 2012

Final Manuscript due: March 3, 2012

Workshop Date: TBA

All paper submissions should follow the IEEE 8.5" x 11" Two-Column Format. Regular Research Paper submission can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version. Position Papers and Short Research Papers, on the other hand, are allowed to be up to 5 pages.

Electronic Submission:

Organizing Committees

General Chair

Xiaohua Jia, City University of Hong Kong

Program Co-chairs

Moti Yung, Google Inc.

Kui Ren, Illinois Institute of Technology

Publicity Chair

Shucheng Yu, University of Arkansas at Little Rock

Technical Program Committee (to be finalized)

Ahmed Azab, North Carolina State University

Jack Brassil, HP Laboratories

Charlie Catlett, Argonne National Laboratory

Sherman S.M. Chow, University of Waterloo

Xuhua Ding, Singapore Management University

Xinwen Fu, University of Massachusetts Lowell

Keesook Han, Air Force Research Laboratory

Xiaohua Jia, City University of Hong Kong

Xuxian Jiang, North Carolina State University

Zhenkai Liang, National University of Singapore

Wenjing Lou, Virginia Polytechnic Institute and State University

Di Ma, University of Michigan Dearborn

Peter Mueller, IBM Zurich Research

Peng Ning, North Carolina State University

Cristina Nita-Rotaru, Purdue University

Kui Ren, Illinois Institute of Technology

Pierangela Samarati, Università degli Studi di Milano

Cliff Wang, US Army Research Office

Sherry Wang, Johns Hopkins University/Applied Physics Laboratory

Xinyuan Wang, George Mason University

Zhi Wang, North Carolina State University

Moti Yung, Google Inc.

Xiaolan (Catherine) Zhang, IBM T.J. Watson Research

Steering Committee

Peng Ning, North Carolina State University, Raleigh

Jeffrey Chase, Duke University

David Du, University of Minnesota

Ari Juels, RSA Laboratories

Wenjing Lou, Virginia Polytechnic Institute and State University

Michael Reiter, University of North Carolina at Chapel Hill

Moti Yung, Google Inc.

Related Resources

doors 2023   3rd Edge Computing Workshop
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
BIOS 2022   8th International Conference on Bioinformatics & Biosciences
ISCAI 2022   2022 4th International Symposium on Computing and Artificial Intelligence (ISCAI 2022)
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
IEEE ICCCBDA 2023   IEEE--2023 the 8th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2023)
IJBB 2022   International Journal on Bioinformatics & Biosciences
CETA 2023   2023 2nd International Conference on Computer Engineering, Technologies and Applications (CETA 2023)
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)