posted by user: bigheaddavid || 7010 views || tracked by 10 users: [display]

IWCSF 2015 : The International Workshop on Cloud Security and Forensics

FacebookTwitterLinkedInGoogle

Link: http://cms.uhd.edu/faculty/yuans/research/IWCSF-2015.htm
 
When Nov 2, 2015 - Nov 4, 2015
Where Shenzhen
Submission Deadline Sep 10, 2015
Notification Due Sep 21, 2015
Final Version Due Oct 1, 2015
Categories    cloud   security   digital forensics
 

Call For Papers

Direct paper submission link: https://edas.info/newPaper.php?c=20983&track=74419

Cloud computing is an emerging yet revolutionary technology. It has started changing the ways people live and work. With the rapid growth of cloud and related services, security and privacy in the Cloud have become increasingly critical issues in the research realm of communications and networks security. The introduction of cloud in existing computer systems and networks has changed the security perspectives and measures, consequently affecting how crime related digital evidence is retrieved, processed, and presented in this environment.
The International Workshop on Cloud Security and Forensics (IWCSF 2015), aptly named for its goals, is a one-day research workshop organized with the objective of bringing together top researchers working on the intersection of the Security of Cloud computing and storage as well as cyber forensics and cyber law to present and discuss their latest research results and ideas, thereby promoting the development and the evolution of this combined body of knowledge. All submissions enabling cross-pollination of ideas on cloud security, cloud privacy, cloud forensics, cyber law, and eDiscovery are welcome. IWCSF 2015 encourages and accepts novel, innovative, and previously unpublished works. Topics include, but are not limited to:

· Infrastructure Cloud Security
· Data and Storage Security in Cloud
· Cloud Access Control
· Cloud Security Management
· Security Hacking and Countermeasures in the Cloud
· Cloud Risk Management and Disaster Recovery
· Cloud Auditing and Compliance
· Security As a Cloud Services
· Mobile Cloud Security and Privacy
· Cyber Law and Terrorism in the Cloud
· Cloud Forensics Process and Models
· Cloud Forensic Data Acquisition
· Cloud Digital Evidence Management
· Cloud Auditing and Compliance
· Cloud Digital Evidence Analysis and Presentation
· Mobile and Wireless Cloud Forensics
· Cloud eDiscovery

The workshop organizers cordially invite submissions of original research work to The International Workshop on Cloud Security and Forensics (IWCSF 2015), in conjunction with The 2015 IEEE/CIC International Conference on Communications in China, to be held on November 2-4, 2015 in Shenzhen, China. Listed below is important information of the workshop and more information of the workshop can be found here http://cms.uhd.edu/faculty/yuans/research/IWCSF_2015.htm. Paper formatting and submission instructions can be found at the 2015 IEEE ICCC website http://www.ieee-iccc.org/submguide.html.
Workshop Organizers
· Shengli Yuan, Ph.D., Associate Professor, Department of Computer Science and Engineering Technology, University of Houston-Downtown; One Main St. Houston, TX 77002, USA; yuans@uhd.edu; Phone: 1-(713) 221-8572; Fax: 1-(713)-223-7407. (primary contact)

· Lei Chen, Ph.D., Associate Professor, Department of Information Technology, Georgia Southern University; P.O. BOX 8150, Statesboro, GA 30460, USA; lchen@georgiasouthern.edu; Phone: 1-(912) 478-5363; Fax: 1-(912) 478-7883.


Important Dates and Location
Workshop: November 1, 2015
Location: Shenzhen, China (venue to be announced)
Paper Due: September 10, 2015
Paper Notification: September 21, 2015
Camera-ready Paper Due: October 1, 2015
Tentative List of Technical Program Committee (TPC) Members
• Dr. Irfan Ahmed, University of New Orleans, USA

• Dr. Lei Chen, Georgia Southern University, USA

• Dr. Song Fu, University of North Texas, USA

• Dr. Lila Ghemri, Texas Southern University, USA
• Dr. Guofei Gu, Texas A&M University, USA

• Dr. Wen-Chen Hu, University of North Dakota, USA

• Dr. Yiming Ji, University of South Carolina Beaufort, USA

• Dr. Wei Wayne Li, Texas Southern University, USA
• Dr. Zhiqiang Lin, University of Texas at Dallas, USA

• Dr. Hassan Takabi, University of North Texas, USA

• Dr. Jie Wu, Temple University, USA

• Dr. Chengjun Wang, Vermont Technical college, USA

• Dr. Shaoen Wu, Ball State University, USA

• Dr. Gongjun Yan, University of Southern Indiana, USA

• Dr. Qing Yang, Montana State University, USA

• Dr. Ming Yang, Kennesaw State University, USA

• Dr. Shengli Yuan, University of Houston-Downtown, USA

▪ Mr. Dongyup Han, Georgia Southern University

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
JISCR 2022   Journal of information security and cybercrimes research
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
ISDFS 2022   10th International Symposium on Digital Forensics and Security
IEEE COINS 2022   International Conference on Omni-Layer Intelligent Systems Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Se
Cloud S&P 2022   Cloud Security and Privacy 2022
DLIS 2022   Deep Learning for IoT Security - Frontiers in Big Data Journal
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
ICDIS 2022   The 4th International Conference on Data Intelligence and Security