posted by user: nashwaelbendary || 8479 views || tracked by 12 users: [display]

CCSP 2012 : Special Session on Cloud Computing: A Security Perspective


When Dec 8, 2012 - Dec 10, 2012
Where Cairo, Egypt
Submission Deadline Jul 31, 2012
Notification Due Aug 15, 2012
Final Version Due Sep 15, 2012
Categories    cloud computing   security   privacy   trust

Call For Papers

Call for papers
Special Session on Cloud Computing: A Security Perspective (CCSP'12)

Under the framework of the International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2012)
will be held on December 8-10, 2012 in Cairo, Egypt.

= General Information =
Cloud computing is one of the fast emerging fields in computing science and technology, which will have a major impact on the quality of science and research as well as human daily life over the coming years. It is a new concept based on the great achievements in computer hardware technologies, such as hardware virtualization, multi-core chips; distributed computing technologies, such as utility computing and grid computing; Internet technologies, such as SOA, Web 2.0, web services, mashups; and computer system management technologies, such as, autonomic computing and data center automation. Recently, great attentions in computation research, education, and business communities have been attracted by the concept of Cloud computing. Moreover, cloud Computing is considered as a way to centralize computation set up, implementation, maintenance, and management then to provide integrated computation to end user or business as services. The typical Cloud Computing paradigm is XaaS, such as the three foundational services, Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).
Despite the fact that cloud Computing has the huge potential in changing the way of computation and provides tremendous research and commercial opportunities, it also creates the great challenges in IT infrastructure, IT and information security, computation policy, industry regulation, and computation management, governance, and legislation due to the fact that clouds still subject to traditional data confidentiality, integrity, availability, and privacy issues, with addition to some other attacks.
Accordingly, to seize the opportunities and to solve the challenging issues have become the great motivation in Cloud Computing education, research, and commercialization. The purpose of this session is to provide a scientific forum gathering people from academia, research, and industry for discussing the most emerging issues, recent advances, and future challenges in the area of security and privacy of cloud computing.

= Topics of Interest =

Topics of interest include, but are not limited to:

· Cloud-delivered security services
· Cryptographic protocols for cloud security
· Secure data management outsourcing
· Privacy and integrity mechanisms for outsourcing
· Cloud-centric threat/attack/vulnerability models
· Secure computation outsourcing
· Trust and policy management in clouds
· Trusted cloud computing technologies
· Secure identity management
· Business clouds and security risk models
· Cost and usability models for security in clouds
· Scalability of security in global-size clouds
· Network security mechanisms for cloud contexts
· Security for emerging cloud programming models
· Energy/cost/efficiency of security in clouds
· Cloud wireless sensor networks
· Web 2.0, SaaS, IaaS, and PaaS cloud related security issues

= Submission Guidelines =

Authors are invited to submit original research contributions not concurrently submitted elsewhere (Submission system). Normal length papers
should be between 8 and 10 pages, formatted in Springer’s single column format (detailed instructions for submissions are given below).
Short papers should be between 5 and 7 pages.
Submitted papers will be refereed by at least three reviewers for quality, correctness, originality, and relevance. Notification and reviews
will be communicated via email.
Papers reporting original research results and experience are solicited. Each paper, written in English, should be no more than 8 pages
in the LNCS Springer style, including references and illustrations. E-submissions in PDF format are strongly recommended.
Web Submission:

All accepted conference papers will be presented at the conference and included in the published proceedings
by Springer's CCIS (Communications in Computer and Information Science) Series and indexed by SCOUPS and EI.

Please follow the instructions on Springer's LNCS webpage when
formatting to ensure that your paper is included in the proceedings
(the word template can be found on the right side as a download link

= Important Dates =

Paper Submission Deadline: July 31,2012
Acceptance Notification: August 15,2012
Camera-Ready Submission Deadline: September 15,2012
Registration Deadline: September 15,2012

= Session Organizers =

*Nashwa El-Bendary
Arab Academy for Science, Technology & Maritime Transport
Cairo, Egypt

*Qing Tan
Athabasca University, School of Computing and Information Systems

*Jinn-Shing Cheng
National Kaohsiung First University of Science and Technology,
Dept. of Information Management

*Aboul Ella Hassanien
Cairo University
Faculty of Computers and Information
Cairo, Egypt


Related Resources

FiCloud 2023   The 10th International Conference on Future Internet of Things and Cloud
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
ACM-Ei/Scopus-CWCBD 2023   2023 4th International Conference on Wireless Communications and Big Data (CWCBD 2023) -EI Compendex
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
ACM-EI/Scopus-ITCC 2023   2023 3rd International Conference on Information Technology and Cloud Computing (ITCC 2023) -EI Compendex
ITCFEC 2023   Special Issue for Submission: Internet of Things and Cloud-Fog-Edge Computing
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
ITCA 2023   11th International Conference of Information Technology, Control and Automation