posted by organizer: zrlkne || 5337 views || tracked by 10 users: [display]

SPC 2015 : First Workshop on Security and Privacy in the Cloud


When Sep 30, 2015 - Sep 30, 2015
Where Florence, Italy
Submission Deadline Jul 9, 2015
Notification Due Aug 3, 2015
Final Version Due Aug 10, 2015
Categories    security   privacy   cloud-computing

Call For Papers

** Deadlne extended: July 9, 2015 - 11.59 pm American Samoa Time **

First IEEE Workshop on Security and Privacy in the Cloud (SPC 2015)
Florence, Italy - September 30, 2015

Cloud computing is today the reference paradigm for large-scale data
storage and processing due to the convenient and efficient network
access to configurable resources that can be easily adjusted according
to the users' needs. Although the benefits of cloud computing are
tremendous, security and privacy concerns have still a detrimental
impact on the adoption and acceptability of cloud services.
In fact, users as well as companies that rely on cloud storage and
computation services lose the direct control over the systems
managing their data and applications, thus putting the confidentiality,
integrity and availability of the data at risk. The goal of this
workshop is to bring together researchers and practitioners who are
interested in discussing the security, privacy, and data protection
issues emerging in cloud scenarios, and possible solutions to them.

SPC 2015 will be held in Florence, Italy, in conjunction with the
IEEE Conference on Communications and Network Security (CNS 2015).

The workshop seeks submissions from academia, industry, and government
presenting novel research, as well as experimental studies, on all
theoretical and practical aspects of security, privacy, and data
protection in cloud scenarios.
Topics of interest include, but are not limited to:
- Anonymity in cloud scenarios
- Applied cryptography in cloud scenarios
- Data and application security
- Data and system integrity
- Data availability in outsourcing scenarios
- Data protection
- Efficient access to outsourced data
- Key management in cloud scenarios
- Privacy
- Privacy of accesses
- Secure computation over encrypted data
- Security and trust metrics
- Security and privacy in crowdsourcing
- Security and privacy in multi-clouds and federated clouds
- Security and privacy in data outsourcing
- Security and privacy in the Internet of Things
- Security and privacy of big data
- Security and privacy of distributed computations
- Security and privacy policies
- Selective information sharing
- Threats, vulnerabilities, and risk management

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions should be at most 9 pages
in the IEEE 8,5"x11" two-column format
Submissions should not be anonymized. The workshop will also consider
short submissions of up to 4 pages for results that are preliminary or
that simply require few pages to describe.
Papers should be submitted for review through EDAS
( Only PDF files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the deadline
of July 9, 2015 (11:59 p.m. American Samoa time).
Authors of accepted papers must guarantee that their papers will be
presented at the workshop.
Accepted and presented papers will be published in the IEEE 2015
Conference Proceedings and submitted to IEEE Xplore as well as
other Abstracting and Indexing (A&I) databases.

Paper submission due [extended]: July 9, 2015 -- 11:59 p.m. American Samoa time
Notification to authors: August 3, 2015
Camera ready due: August 10, 2015

Elli Androulaki, IBM Research - Zurich, Switzerland
Sara Foresti, Università degli Studi di Milano, Italy

Nikola Knežević, IBM Research - Zurich, Switzerland

Massimiliano Albanese, George Mason University, USA
Rajkumar Buyya, University of Melbourne, Australia
Christian Cachin, IBM Research Zurich, Switzerland
Roy Campbell, University of Illinois at Urbana-Champaign, USA
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Theo Dimitrakos, British Telecom, UK
Sotiris Ioannidis, FORTH, Greece
Seny Kamara, Microsoft Research, USA
Ghassan Karame, NEC Labs, Germany
Florian Kerschbaum, SAP, Germany
Samee Khan, North Dakota State University, USA
Javier Lopez, University of Malaga, Spain
Jesus Luna, CSA Europe, UK
Melek Onen, EURECOM, France
Stefano Paraboschi,Università di Bergamo, Italy
Siani Pearson, HP Labs, UK
Kui Ren, University at Buffalo, USA
Pierangela Samarati, Università degli Studi di Milano, Italy
Andreas Schaad, Huawei Research, Germany
Anoop Singhal, NIST, USA
Alessandro Sorniotti, IBM Research - Zurich, Switzerland
Neeraj Suri, TU Darmstadt, Germany
Jaideep Vaidya, Rutgers University, USA
Cong Wang, City University of Hong Kong, Hong Kong
Meng Yu, Virginia Commonwealth University, USA
Moti Yung, Google, USA

If you have any question, please contact the organizers at

Related Resources

ACNS 2021   19th International Conference on Applied Cryptography and Network Security
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
CSPPSG 2021   MDPI Sensors - Special Issue on 'Cybersecurity and Privacy-Preserving in Modern Smart Grid'
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ACM ASSS 2021   The ACM 1st International Symposium on Advanced Security on Software and Systems
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
SPTM 2021   9th International Conference of Security, Privacy and Trust Management
Sensors (MDPI) 2020   Special Issue on Security, Trust and Privacy in New Computing Environments
Sensors (MDPI) SI 2021   Sensors SI on Security, Trust and Privacy in New Computing Environments
WCMC - Blockchain SI 2021   WCMC - Blockchain in Wireless Communications and Computing: Security Threats and Applications