posted by user: bigheaddavid || 6390 views || tracked by 10 users: [display]

IWCSF 2015 : The International Workshop on Cloud Security and Forensics

FacebookTwitterLinkedInGoogle

Link: http://cms.uhd.edu/faculty/yuans/research/IWCSF-2015.htm
 
When Nov 2, 2015 - Nov 4, 2015
Where Shenzhen
Submission Deadline Sep 10, 2015
Notification Due Sep 21, 2015
Final Version Due Oct 1, 2015
Categories    cloud   security   digital forensics
 

Call For Papers

Direct paper submission link: https://edas.info/newPaper.php?c=20983&track=74419

Cloud computing is an emerging yet revolutionary technology. It has started changing the ways people live and work. With the rapid growth of cloud and related services, security and privacy in the Cloud have become increasingly critical issues in the research realm of communications and networks security. The introduction of cloud in existing computer systems and networks has changed the security perspectives and measures, consequently affecting how crime related digital evidence is retrieved, processed, and presented in this environment.
The International Workshop on Cloud Security and Forensics (IWCSF 2015), aptly named for its goals, is a one-day research workshop organized with the objective of bringing together top researchers working on the intersection of the Security of Cloud computing and storage as well as cyber forensics and cyber law to present and discuss their latest research results and ideas, thereby promoting the development and the evolution of this combined body of knowledge. All submissions enabling cross-pollination of ideas on cloud security, cloud privacy, cloud forensics, cyber law, and eDiscovery are welcome. IWCSF 2015 encourages and accepts novel, innovative, and previously unpublished works. Topics include, but are not limited to:

· Infrastructure Cloud Security
· Data and Storage Security in Cloud
· Cloud Access Control
· Cloud Security Management
· Security Hacking and Countermeasures in the Cloud
· Cloud Risk Management and Disaster Recovery
· Cloud Auditing and Compliance
· Security As a Cloud Services
· Mobile Cloud Security and Privacy
· Cyber Law and Terrorism in the Cloud
· Cloud Forensics Process and Models
· Cloud Forensic Data Acquisition
· Cloud Digital Evidence Management
· Cloud Auditing and Compliance
· Cloud Digital Evidence Analysis and Presentation
· Mobile and Wireless Cloud Forensics
· Cloud eDiscovery

The workshop organizers cordially invite submissions of original research work to The International Workshop on Cloud Security and Forensics (IWCSF 2015), in conjunction with The 2015 IEEE/CIC International Conference on Communications in China, to be held on November 2-4, 2015 in Shenzhen, China. Listed below is important information of the workshop and more information of the workshop can be found here http://cms.uhd.edu/faculty/yuans/research/IWCSF_2015.htm. Paper formatting and submission instructions can be found at the 2015 IEEE ICCC website http://www.ieee-iccc.org/submguide.html.
Workshop Organizers
· Shengli Yuan, Ph.D., Associate Professor, Department of Computer Science and Engineering Technology, University of Houston-Downtown; One Main St. Houston, TX 77002, USA; yuans@uhd.edu; Phone: 1-(713) 221-8572; Fax: 1-(713)-223-7407. (primary contact)

· Lei Chen, Ph.D., Associate Professor, Department of Information Technology, Georgia Southern University; P.O. BOX 8150, Statesboro, GA 30460, USA; lchen@georgiasouthern.edu; Phone: 1-(912) 478-5363; Fax: 1-(912) 478-7883.


Important Dates and Location
Workshop: November 1, 2015
Location: Shenzhen, China (venue to be announced)
Paper Due: September 10, 2015
Paper Notification: September 21, 2015
Camera-ready Paper Due: October 1, 2015
Tentative List of Technical Program Committee (TPC) Members
• Dr. Irfan Ahmed, University of New Orleans, USA

• Dr. Lei Chen, Georgia Southern University, USA

• Dr. Song Fu, University of North Texas, USA

• Dr. Lila Ghemri, Texas Southern University, USA
• Dr. Guofei Gu, Texas A&M University, USA

• Dr. Wen-Chen Hu, University of North Dakota, USA

• Dr. Yiming Ji, University of South Carolina Beaufort, USA

• Dr. Wei Wayne Li, Texas Southern University, USA
• Dr. Zhiqiang Lin, University of Texas at Dallas, USA

• Dr. Hassan Takabi, University of North Texas, USA

• Dr. Jie Wu, Temple University, USA

• Dr. Chengjun Wang, Vermont Technical college, USA

• Dr. Shaoen Wu, Ball State University, USA

• Dr. Gongjun Yan, University of Southern Indiana, USA

• Dr. Qing Yang, Montana State University, USA

• Dr. Ming Yang, Kennesaw State University, USA

• Dr. Shengli Yuan, University of Houston-Downtown, USA

▪ Mr. Dongyup Han, Georgia Southern University

Related Resources

JoWUA SI 2021   JoWUA Special Issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
IWBF 2021   9th IEEE International Workshop on Biometrics and Forensics (IWBF) 2021
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ACNS 2021   19th International Conference on Applied Cryptography and Network Security
CCNC 2021   IEEE Consumer Communications & Networking Conference
USENIX Security 2021   30th USENIX Security Symposium (Winter Deadline)
Spinger MMSJ: DL MM healthcare 2020   Deep Learning for Multimedia Healthcare
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)