posted by user: cm2brian || 6216 views || tracked by 2 users: [display]

WSCC 2014 : The Second International Workshop on Security in Cloud Computing

FacebookTwitterLinkedInGoogle

Link: http://conference.cs.cityu.edu.hk/asiaccsscc/
 
When Jun 3, 2014 - Jun 3, 2014
Where Kyoto, Japan
Submission Deadline Mar 1, 2014
Notification Due Mar 28, 2014
Final Version Due Apr 8, 2014
Categories    cloud computing   security
 

Call For Papers

Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:

Secure cloud architecture
Cloud access control and key management
Identification and privacy in cloud
Integrity assurance for data outsourcing
Integrity and verifiable computation
Computation over encrypted data
Software and data segregation security
Secure management of virtualized resources
Trusted computing technology
Joint security and privacy aware protocol design
Failure detection and prediction
Secure data management within and across data centers
Availability, recovery and auditing
Secure computation outsourcing
Secure mobile cloud
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.

Related Resources

Ei/Scopus-CCNML 2025   2025 5th International Conference on Communications, Networking and Machine Learning (CCNML 2025)
ICAIBD 2026   IEEE--2026 The 9th International Conference on Artificial Intelligence and Big Data (ICAIBD 2026)
ITCCMA 2025   12th International Conference on Information Technology, Control, Chaos, Modeling and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSP 2026   2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
Ei/Scopus-MLBDM 2025   2025 5th International Conference on Machine Learning and Big Data Management (MLBDM 2025)
CETA 2025   IEEE--2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
ICCCAS 2026   2026 IEEE the 15th International Conference on Communications, Circuits, and Systems (ICCCAS 2026)
BDIoT 2025   6th International Conference on Big Data & IoT
ICCCBDA 2026   IEEE--2026 the 11th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2026)