SPCC 2012 - ICDCS-SPCC 2012 : The 3rd International Workshop on Security and Privacy in Cloud Computing
View: 1466
Website www.ece.iit.edu/~ubisec/workshop.htm |
Edit Freely
Category Distributed Computing
Deadline: January 08, 2012 | Date: June 18, 2012-June 21, 2012
Venue/Country: Macau, Macau
Updated: 2011-12-06 15:10:18 (GMT+9)
Call For Papers - CFP
Cloud computing has recently emerged as a new information technology infrastructure. Cloud computing has unique attributes that raise many security and privacy challenges in areas such as data security, recovery, and privacy, as well as legal issues in areas such as regulatory compliance and auditing. In contrast to traditional enterprise IT solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the servers in large data centers on the Internet, where the management of the data and services are not fully trustworthy. When clients store their data on the server without themselves possessing a copy of it, how the integrity of the data can be ensured if the server is not fully trustworthy? Will encryption solve the data confidentiality problem of sensitive data? How will encryption affect dynamic data operations such as query, insertion, modification, and deletion? Data in the cloud is typically in a shared environment alongside data from other clients. How the data segregation should be done, while data are stored, transmitted, and processed? Due to the fundamental paradigm shift in cloud computing, many security concerns have to be better understood, unanticipated vulnerabilities identified, and viable solutions to critical threats devised, before the wide deployment of cloud computing techniques can take place.We are soliciting both full papers that present relatively complete and mature research results and short position papers that report work-in-progress but inspiring and intriguing new ideas. Topics of interests include (but are not limited to) the following subject categories:Secure cloud architectureCloud access control and key managementIdentification and privacy in cloudRemote data integrity protectionDynamic data operation securitySoftware and data segregation securitySecure management of virtualized resourcesJoint security and privacy aware protocol designFailure detection and predictionSecure data management within and across data centersAvailability, recovery and auditingSecure wireless cloudAuthors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing, and Short Research Papers that describe work-in-progress ideas are also welcome. Research Papers and Position Papers will be reviewed separately.Time TableManuscript submission: January 8, 2012Acceptance notification: February 22, 2012Final Manuscript due: March 3, 2012 Workshop Date: TBAPaper SubmissionForm of Manucript: All paper submissions should follow the IEEE 8.5" x 11" Two-Column Format. Regular Research Paper submission can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version. Position Papers and Short Research Papers, on the other hand, are allowed to be up to 5 pages.Electronic Submission: https://www.easychair.org/conferences/?conf=icdcsspcc12
. Organizing CommitteesGeneral ChairXiaohua Jia, City University of Hong KongProgram Co-chairsMoti Yung, Google Inc. Kui Ren, Illinois Institute of TechnologyPublicity ChairShucheng Yu, University of Arkansas at Little RockTechnical Program Committee (to be finalized)Ahmed Azab, North Carolina State UniversityJack Brassil, HP LaboratoriesCharlie Catlett, Argonne National LaboratorySherman S.M. Chow, University of WaterlooXuhua Ding, Singapore Management UniversityXinwen Fu, University of Massachusetts LowellKeesook Han, Air Force Research LaboratoryXiaohua Jia, City University of Hong KongXuxian Jiang, North Carolina State UniversityZhenkai Liang, National University of SingaporeXiaodong Lin, University of Ontario Institute of TechnologyWenjing Lou, Virginia Polytechnic Institute and State UniversityDi Ma, University of Michigan DearbornPeter Mueller, IBM Zurich ResearchPeng Ning, North Carolina State UniversityCristina Nita-Rotaru, Purdue UniversityKui Ren, Illinois Institute of TechnologyPierangela Samarati, Università degli Studi di MilanoCliff Wang, US Army Research OfficeSherry Wang, Johns Hopkins University/Applied Physics LaboratoryXinyuan Wang, George Mason University Zhi Wang, North Carolina State UniversityMoti Yung, Google Inc.Xiaolan (Catherine) Zhang, IBM T.J. Watson ResearchSteering CommitteePeng Ning, North Carolina State University, RaleighJeffrey Chase, Duke University David Du, University of Minnesota Ari Juels, RSA Laboratories Wenjing Lou, Virginia Polytechnic Institute and State University Michael Reiter, University of North Carolina at Chapel Hill Moti Yung, Google Inc.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.