| |||||||||||
PriSecCSN 2012 : The 2012 International Symposium on Privacy and Security in Cloud and Social Networks | |||||||||||
Link: http://www.swinflow.org/confs/prisec2012 | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The symposium solicits novel papers on a broad range of topics, including but not limited to:
Security and privacy in Big Data management Application of modern cryptography in cloud and social networks Emerging threats in cloud-based services Multi-tenancy related security/privacy issues Secure virtualisation mechanisms Vulnerabilities in cloud infrastructure Vulnerabilities in MapReduce Security modelling and threats in cloud computing Security/privacy in hybrid cloud Auditing in cloud computing Access control in cloud computing Secure Job deployment and scheduling Secure resource allocation and indexing User authentication in cloud services Practical privacy and integrity mechanisms for data outsourcing Foundations of cloud-centric threat models Information hiding Trust and policy management in cloud Secure identity management mechanisms Security/privacy/trust issues in SaaS/PaaS/IaaS Business and security risk models Cost and usability models related security issues in clouds Security for emerging cloud programming models Remote data integrity protection Securing distributed data storage in the cloud Data-centric security and data classification Security and privacy in mobile cloud Intrusion detection/prevention Malware propagation in social networks Information leakage via social networks Social currency mechanisms - potential and risks Privacy management in social networks - access controls, permissions Identity theft in social networks Collaborative detection of distributed network attacks Peer-to-peer based security mechanisms Trust and reputation in social networks Socially inspired network security architectures Socially aware network security protocols Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.) Configuring security protocol parameters based on social information Privacy-preserving methods for data access and data mining Domain Security Privacy Requirements Engineering Private Information Retrieval Privacy and Security in Personal Health Records Online Social Footprints Secure Multi-party Computation Privacy Mechanisms in Services Pseudonymity and Anonymity Modelling Software Security Engineering Integrity Verification Trust Development in Collaboration Teams Usable Privacy Design Privacy Aware Access Control Model Multi-Faceted Privacy Preservation Access Control and RBAC Policies |
|