posted by user: amunoz || 5004 views || tracked by 8 users: [display]

WOCOS 2013 : Workshop on Cloud Security

FacebookTwitterLinkedInGoogle

Link: http://www.asesite.org/conferences/cybersecurity/2013/workshops_symposia.html
 
When Dec 10, 2013 - Dec 15, 2013
Where Orlando, Fl, USA
Submission Deadline Jul 15, 2013
Notification Due Sep 15, 2013
Final Version Due Oct 15, 2013
Categories    computer science   cloud computing   virtualization   CERTIFICATION
 

Call For Papers

Description
Cloud technology offers a powerful and fast growing approach to the provision of infrastructure, platform and software services without the high costs of owning, operating and maintaining the computational infrastructures required for this purpose. However, despite its appeal from the economic, operational and even energy consumption perspectives, cloud technology still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. These concerns arise from the difficulty to verify security properties of the different types of applications and services available through cloud technology and the uncertainty of the owners and users of such services about the security of their services, and of the applications based on them, once they are deployed and offered through a cloud. This difficulty stems from both the fact that the provision and security of a cloud service is sensitive to potential interference between the features and behaviour of all the inter-dependent services in all layers of the cloud stack, as well as dynamic changes in them; and the fact that current cloud models and infrastructure do not provide adequate support for controlling the behaviour of cloud software and for managing the decoupling of evolution cycles of the different software components, both applications and services, which happens in these scenarios. In this setting, system evolution, an inherent process in most computing systems, has an important impact on the security, resilience and quality of the cloud. In this line certification and other assurance approaches become crucial for establishing the necessary trust relationships. Likewise, novel testing mechanisms, engineering approaches, formal modelling paradigms, monitoring models, runtime support infrastructures, secure dynamic application building and service orchestration approaches, etc. are needed in order to fill other gaps and to restore the missing trust links in these new scenarios. The workshop will provide a forum for presenting research results, practical experiences, and innovative ideas in security infrastructures and applications for cloud computing. The workshop will focus on Cloud Computing security, how users of Cloud systems can be educated to maintain the security posture of their systems, and how to improve the state of the art of Cloud Computing. The workshop will also look at the need to facilitate research and development of the next generation of Cloud Computing security standards and tools to assist in the creation of better, more secure systems.

List of Topics

Secure Virtualization Structures
Privacy Enforcement for cloud applications, platforms and operations
Monitoring systems for cloud infrastructure/platform applications
Cloud security architecture and protocol
Data protection and secured information sharing in the cloud
Evolution of multi-tenant monitoring as a function of the number of tenants.
Intra- and inter-cloud security issues and considerations
Privacy policy framework for clouds
Access control mechanisms and trust models for cloud services
Energy/cost/efficiency of security in clouds
Mobile Cloud Networking
Content and Service Distribution

Related Resources

BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ICDPA 2025   2025 The 11th International Conference on Data Processing and Applications (ICDPA 2025)
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
MLSC 2025   6th International Conference on Machine Learning and Soft Computing
CCGrid 2025   The 25th IEEE international Symposium on Cluster, Cloud and Internet Computing
CEU 2025   8th International Conference on Civil Engineering and Urban Planning