| |||||||||||||||
PriSecCSN 2013 : The 2nd International Symposium on Privacy and Security in Cloud and Social Networks | |||||||||||||||
Link: https://sites.google.com/site/prisec2013/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for papers: The 2nd International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2013), 30 September, 2013, Karlsruhe, Germany.
The website is: https://sites.google.com/site/prisec2013/ Important dates: Deadline for Paper Submission: June 25, 2013 Notification of Acceptance: July 15, 2013 Camera Ready Copies: August 12, 2013 Submission site and requirements: https://www.easychair.org/conferences/?conf=priseccsn2013 Please submit your paper(s) in PDF file. Papers should be limited up to 8 pages in IEEE CS format. The template files for LATEX or WORD can be downloaded from the symposium website. All papers will be peer reviewed by two or three pc members. Submitting a paper to the symposium means that if the paper is accepted, at least one author should register to CGC2013 and attend the conference to present the paper. Publications: All accepted papers will appear in the proceedings published by IEEE Computer Society (EI indexed). Selected papers will be invited to special issues of CGC2013 in: Concurrency and Computing: Practice and Experience Journal of Network and Computer Applications Personal and Ubiquitious Computing Journal of Systems and Software Introduction: Social network analysis and cloud computing are two of the most exciting new trends in the recent developments of information technology. As the new generation computing paradigm, cloud enables computing resources to be provided as IT services in a pay-as-you-go fashion with high efficiency and effectiveness. With the popularity of social software as well as the fast development of cloud and other high-performance computing infrastructures, the outcome of social network analysis is becoming more and more attractive. However, information privacy and security issues are major challenges in both these areas. This symposium aims at providing a forum for researchers, practitioners and developers from different background areas such as distributed computing, social computing, information security and privacy protection areas to exchange the latest experience, research ideas and synergic research and development on fundamental issues and applications about security and privacy issu! es in cloud environments and social networks. The symposium solicits high quality research results in all related areas. Topics: The objective of this symposium is to invite authors to submit original manuscripts that demonstrate and explore current advances in all aspects of security and privacy in cloud computing environments. The symposium solicits novel papers on a broad range of topics, including but not limited to: Security and privacy in Big Data management Application of modern cryptography in cloud and social networks Emerging threats in cloud-based services Multi-tenancy related security/privacy issues Secure virtualisation mechanisms Vulnerabilities in cloud infrastructure Vulnerabilities in MapReduce Security modelling and threats in cloud computing Security/privacy in hybrid cloud Auditing in cloud computing Access control in cloud computing Secure Job deployment and scheduling Secure resource allocation and indexing User authentication in cloud services Practical privacy and integrity mechanisms for data outsourcing Foundations of cloud-centric threat models Information hiding Trust and policy management in cloud Secure identity management mechanisms Security/privacy/trust issues in SaaS/PaaS/IaaS Business and security risk models Cost and usability models related security issues in clouds Security for emerging cloud programming models Remote data integrity protection Securing distributed data storage in the cloud Data-centric security and data classification Security and privacy in mobile cloud Intrusion detection/prevention Malware propagation in social networks Information leakage via social networks Social currency mechanisms - potential and risks Privacy management in social networks - access controls, permissions Identity theft in social networks Collaborative detection of distributed network attacks Peer-to-peer based security mechanisms Trust and reputation in social networks Socially inspired network security architectures Socially aware network security protocols Security configuration based on social contexts groups (social-firewall, authentication protocols, etc.) Configuring security protocol parameters based on social information Privacy-preserving methods for data access and data mining Domain Security Privacy Requirements Engineering Private Information Retrieval Privacy and Security in Personal Health Records Online Social Footprints Secure Multi-party Computation Privacy Mechanisms in Services Pseudonymity and Anonymity Modelling Software Security Engineering Integrity Verification Trust Development in Collaboration Teams Usable Privacy Design Privacy Aware Access Control Model Multi-Faceted Privacy Preservation Access Control and RBAC Policies General Chairs: Philip S. Yu, University of Illinois at Chicago, USA Kui Ren, University at Buffalo, State University of New York Program Chairs: Chang Liu, University of Technology, Sydney, Australia Rajiv Ranjan, CSIRO, Australia Jinjun Chen, University of Technology, Sydney, Australia Program Committee: Rose-Mharie Åhlfeldt, University of Skövde, Sweden Cristina Alcaraz, University of Malaga, Spain Ahmed M. Azab, North Carolina State University, USA Carlo Blundo, Universita` degli Studi di Salerno, Italy Shiping Chen, CSIRO ICT Centre, Australia Rui Chen, Hong Kong Baptist University, Hong Kong Yingying (Jennifer) Chen, Stevens Institute of Technology, USA Frederic Cuppens, Telecom Bretagne, France Geeth R De mel, IBM, USA Yves-Alexandre De Montjoye, MIT, USA Rino Falcone, National Research Council, Italy Carmen Fernandez-Gago, University of Malaga, Spain Debasis Giri, Haldia Institute of Technology, India Kartik Gopalan, SUNY – Binghamton, USA Ching-Hsien Hsu, Chung Hua University, Taiwan Meiko Jensen, Ruhr University Bochum, Germany Henrik Johnsson, Blekinge Institute of Technology, Sweden Giovanni Livraga, Universita' degli Studi di Milano, Italy Muthucumaru Maheswaran, McGill University, Canada David Naccache, ENS, France Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy Guenther Pernul, University of Regensburg, Germany Neeli R. Prasad, Aalborg University, Denmark Rami Puzis, Ben Gurion University, Israel Jean-Jacques Quisquater, UCL, Belgium Silvio Ranise, Fondazione Bruno Kessler, Italy Karen Renaud, University of Glasgow, Scotland Jean-Marc Seigneur, University of Geneva, Switzerland Ketil Stolen, University of Oslo, Norway Sotirios Terzis, University of Strathclyde, UK Bharadwaj Veeravalli, The National University of Singapore Guilin Wang, University of Wollongong, Australia Hua Wang, University of Southern Queensland, Australia Ke Wang, Simon Fraser University, Burnaby Yang Xiang, Deakin University, Australia Jie Zhang, Nanyang Technological University, Singapore Any inquiries, please direct to Chang Liu at changliu.it@gmail.com. |
|