posted by user: jkawamoto || 6778 views || tracked by 8 users: [display]

AsiaCCS SCC 2014 : The Second International Workshop on Security in Cloud Computing


When Jun 3, 2014 - Jun 3, 2014
Where Kyoto, Japan
Submission Deadline Mar 1, 2014
Notification Due Mar 22, 2014
Final Version Due Mar 31, 2014
Categories    security   cloud

Call For Papers

Call for Papers
Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:

Secure cloud architecture
Cloud access control and key management
Identification and privacy in cloud
Integrity assurance for data outsourcing
Integrity and verifiable computation
Computation over encrypted data
Software and data segregation security
Secure management of virtualized resources
Trusted computing technology
Joint security and privacy aware protocol design
Failure detection and prediction
Secure data management within and across data centers
Availability, recovery and auditing
Secure computation outsourcing
Secure mobile cloud
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.

Important Dates
Submissions Deadline: Mar. 1, 2014
Notification Date: Mar. 22, 2014
Final Submission Date: Mar. 31, 2014
Workshop: Jun 3, 2014

Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.

Electronic submission site:


General Chair

Robert Deng, Singapore Management University

Program Co-Chairs

Kui Ren, State University of New York, Buffalo
Elaine Shi, University of Maryland, College Park

TPC Members

Gail­Joon Ahn, Arizona State University
Sherman S.M. Chow, The Chinese University of Hong Kong
Reza Curtmola, New Jersey Institute of Technology
Roberto Di Pietro, Università di Roma Tre
Xuhua Ding, Singapore Management University
Kevin Du, Syracuse University
Sara Foresti, Università degli Studi di Milano
Keesook Han, Air Force Research Laboratory
Ragib Hasan, University of Alabama at Birmingham
Yan Huang, University of Maryland
Dijiang Huang, Arizona State University
Kwangjo Kim, Korea Advanced Institute of Science and Technology
Xiaohui Liang, Dartmouth College
Feng-Hao Liu, University of Maryland
Jiqiang Liu, Beijing Jiaotong University
Yao Liu, University of South Florida
Rongxing Lu, Nanyang Technological University
Di Ma, University of Michigan-Dearborn
Abedelaziz Mohaisen, Verisign Labs
Prashanth Mohan, FireEye
Daniela Oliveira, Bowdoin College
Ning Qu, Google Inc.
Anna Squicciarini, The Pennsylvania State University
Kun Sun, George Mason University
Xingming Sun, Nanjing Univ. of Information Science & Technology
Jakub Szefer, Yale University
Shaohua Tang, South China University of Technology
Cong Wang, City University of Hong Kong
Guilin Wang, Huawei International
Lihua Wang, NICT
Lingyu Wang, Concordia University
Qian Wang, Wuhan University
Xiaofeng Wang, Indiana University
Zhi Wang, Florida State University
Tao Wei, UC Berkeley and Peking University
Jian Weng, Jinan University
Qi Xie, Hangzhou Normal University
Hui Xue, FireEye
Kan Yang, University of Waterloo
Siu-Ming Yiu, The University of Hong Kong
Jia Yu, State University of New York
Shucheng Yu, University of Arkansas at Little Rock
Fangguo Zhang, Sun Yat-sen University
Jianqing Zhang, Intel Research
Xinchang Zhang, Shandong Academy of Sciences
Sheng Zhong, Nanjing University
Sencun Zhu, The Pennsylvania State University

Web and Publicity Chair

Di Ma, University of Michigan-Dearborn
Cong Wang, City University of Hong Kong

Related Resources

ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
SP 2020   IEEE Symposium on Security and Privacy
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
icist 2020   acm- 10th International Conference on Information Systems and Technologies
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
CBDCom 2020   The 6th IEEE International Conference on Cloud and Big Data Computing
ICSS 2019   5th International Conference on Software Security
ICCIA--IEEE, Ei, Scopus 2020   IEEE--2020 5th International Conference on Computational Intelligence and Applications (ICCIA 2020)--Ei Compendex, Scopus