Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    PRISECCSN 2012 - The 2012 International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2012)

    View: 748

    Website | Want to Edit it Edit Freely

    Category PRISECCSN 2012

    Deadline: June 25, 2012 | Date: November 01, 2012-November 03, 2012

    Venue/Country: Xiangtan, China

    Updated: 2012-05-07 23:25:42 (GMT+9)

    Call For Papers - CFP

    The 2012 International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2012), 1-3 Nov. 2012, Xiangtan, China.

    The website is: http://www.swinflow.org/confs/prisec2012/.

    Important dates:

    Deadline for Paper Submission: June 25, 2012

    Notification of Acceptance: July 30, 2012

    Camera Ready Copies: August 10, 2012

    Submission site and requirements:

    https://www.easychair.org/conferences/?conf=prisec2012. Submit your paper(s) in PDF file. Papers should be limited up to 8 pages in IEEE CS format. The template files for LATEX or WORD can be downloaded from the symposium website. All papers will be peer reviewed by two or three pc members. Submitting a paper to the symposium means that if the paper is accepted, at least one author should register to CGC2012 and attend the conference to present the paper.

    Publications:

    All accepted papers will appear in the proceedings published by IEEE Computer Society (EI indexed). Selected papers will be invited to special issues of CGC2012 in Concurrency and Computation: Practice and Experience, Future Generation Computer Systems and International Journal of High Performance Computing Applications.

    Introduction:

    Social network analysis and cloud computing are two of the most exciting new trends in the recent developments of information technology. As the new generation computing paradigm, cloud enables computing resources to be provided as IT services in a pay-as-you-go fashion with high efficiency and effectiveness. With the popularity of social software as well as the fast development of cloud and other high-performance computing infrastructures, the outcome of social network analysis is becoming more and more attractive. However, information privacy and security issues are major challenges in both these areas. This symposium aims at providing a forum for researchers, practitioners and developers from different background areas such as distributed computing, social computing, information security and privacy protection areas to exchange the latest experience, research ideas and synergic research and development on fundamental issues and applications about security and privacy issues in cloud environments and social networks. The symposium solicits high quality research results in all related areas.

    Topics:

    The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The symposium solicits novel papers on a broad range of topics, including but not limited to:

    Security and privacy in Big Data management

    Application of modern cryptography in cloud and social networks

    Emerging threats in cloud-based services

    Multi-tenancy related security/privacy issues

    Secure virtualisation mechanisms

    Vulnerabilities in cloud infrastructure

    Vulnerabilities in MapReduce

    Security modelling and threats in cloud computing

    Security/privacy in hybrid cloud

    Auditing in cloud computing

    Access control in cloud computing

    Secure Job deployment and scheduling

    Secure resource allocation and indexing

    User authentication in cloud services

    Practical privacy and integrity mechanisms for data outsourcing

    Foundations of cloud-centric threat models

    Information hiding

    Trust and policy management in cloud

    Secure identity management mechanisms

    Security/privacy/trust issues in SaaS/PaaS/IaaS

    Business and security risk models

    Cost and usability models related security issues in clouds

    Security for emerging cloud programming models

    Remote data integrity protection

    Securing distributed data storage in the cloud

    Data-centric security and data classification

    Security and privacy in mobile cloud

    Intrusion detection/prevention

    Malware propagation in social networks

    Information leakage via social networks

    Social currency mechanisms - potential and risks

    Privacy management in social networks - access controls, permissions

    Identity theft in social networks

    Collaborative detection of distributed network attacks

    Peer-to-peer based security mechanisms

    Trust and reputation in social networks

    Socially inspired network security architectures

    Socially aware network security protocols

    Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.)

    Configuring security protocol parameters based on social information

    Privacy-preserving methods for data access and data mining

    Domain Security

    Privacy Requirements Engineering

    Private Information Retrieval

    Privacy and Security in Personal Health Records

    Online Social Footprints

    Secure Multi-party Computation

    Privacy Mechanisms in Services

    Pseudonymity and Anonymity Modelling

    Software Security Engineering

    Integrity Verification

    Trust Development in Collaboration Teams

    Usable Privacy Design

    Privacy Aware Access Control Model

    Multi-Faceted Privacy Preservation

    Access Control and RBAC Policies

    Submission Requirements

    General Chairs:

    Philip S. Yu, University of Illinois at Chicago, USA

    Bhavani Thuraisingham, The University of Texas at Dallas, USA

    Vijay Varadharajan, Macquarie University, Australia

    Program Chairs:

    Chang Liu, University of Technology, Sydney, Australia

    Rajiv Ranjan, CSIRO, Australia

    Jinjun Chen, University of Technology, Sydney, Australia

    Any enqueries, please direct to Chang Liu at changliu.itatgmail.com.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.