posted by user: markjsca1 || 3395 views || tracked by 9 users: [display]

WCSF 2015 : The International Workshop on Cloud Security and Forensics

FacebookTwitterLinkedInGoogle

Link: http://www.wcsf.co
 
When Aug 24, 2015 - Aug 28, 2015
Where Toulouse, France
Submission Deadline Apr 1, 2015
Notification Due May 11, 2015
Final Version Due Jun 8, 2015
Categories    digital forensics   cloud forensics   cloud security   cybersecurity
 

Call For Papers

The International Workshop on Cloud Security and Forensics (WCSF 2015)
to be held in conjunction with the 10th International Conference on Availability, Reliability and Security (ARES 2015 – http://www.ares-conference.eu)

August 24-28, 2015
Université Paul Sabatier
Toulouse, France



Cloud computing offers utility oriented Information and Communications Technology (ICT) services to users all over the world. The evolution of cloud computing is driving the design of datacentres by architecting them as networks of virtual services; this enables users to access and run applications from anywhere in the world. As the prevalence and usage of networked cloud computer systems increases, logically the security of these systems can pose significant security concerns and the likelihood of these systems being used for criminal behaviour also increases. Thus, this new computing evolution has a direct effect on, and creates challenges for, cybersecurity and digital forensic practitioners.

The field of digital forensics has grown rapidly over the last decade due to the rise of the Internet and associated crimes; however while the theory is well established, the practical application of the discipline is still new and developing. Law enforcement agencies can no longer rely on traditional digital forensic methods of data acquisition through device seizure to gather relevant evidence pertaining to an investigation from cloud sources. Using traditional digital forensic methods will lead to the loss or overlooking of valuable evidential material hosted on cloud-based infrastructures. Cloud computing and its impact on digital forensics will continue to grow and traditional digital forensics methods are inadequate for cloud forensic investigations.



Topics of interest comprise but are not limited to:
---------------------------------------------------
Cloud Forensics and e-Discovery
Intrusion and Attack Readiness
Cloud Cryptography
Datacentre and Data Security
Big Data Forensics
Security and Privacy for Cloud Computing
Trust and Policy Management
Case Studies of Cloud-based Attacks
Cloud Data Recovery
Private Cloud Security



Important Dates
---------------
Submission Deadline April 1, 2015
Author Notification May 11, 2015
Proceedings Version June 8, 2015
Conference August 24-28, 2015



Workshop Chairs
---------------
Mark Scanlon (Chair)
University College Dublin, Ireland
mark.scanlon[at]ucd.ie

Nhien-An Le-Khac (Co-Chair)
University College Dublin, Ireland
an.lekhac[at]ucd.ie



Submission
----------
The proceedings of WCSF will be published by Conference Publishing Services (CPS) of IEEE. The submission guidelines valid for the WCSF workshop are the same as for the ARES conference. They can be found at http://www.ares-conference.eu/conference/?page_id=135

Related Resources

BDACCIP 2022   The 6th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
C&ESAR 2022   Ensuring Trust in a Decentralized World
ICNCC 2022   2022 The 11th International Conference on Networks, Communication and Computing (ICNCC 2022)
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
ICGS3 2022   14TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY & SUSTAINABILITY
JITST 2022   Journal of Internet Technology and Secured Transactions
ISDFS 2022   10th International Symposium on Digital Forensics and Security
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
No Hat 2022   Computer Security Conference