| |||||||||||||||
ASIACCS-SCC 2015 : The Third ASIACCS International Workshop on Security in Cloud Computing | |||||||||||||||
Link: http://conference.cs.cityu.edu.hk/asiaccsscc | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:
Secure cloud architecture Cloud Cryptography Cloud access control and key management Identification and privacy in cloud Integrity assurance for data outsourcing Integrity and verifiable computation Computation over encrypted data Software and data segregation security Secure management of virtualized resources Trusted computing technology Joint security and privacy aware protocol design Failure detection and prediction Secure data management within and across data centers Availability, recovery and auditing Secure computation outsourcing Secure mobile cloud Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome. Important Dates Submissions Deadline: Dec. 23, 2014 Notification: Jan. 19, 2015 Final Submission Date: Jan. 28, 2015 Workshop: April 14, 2015 Submission Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary. Electronic submission site: https://easychair.org/conferences/?conf=asiaccsscc2015. Organizers Program Co-Chairs Sherman S.M. Chow, The Chinese University of Hong Kong, Hong Kong Danfeng Yao, Virginia Tech, US Steering Committee Kui Ren, State University of New York at Buffalo, US Elaine Shi, University of Maryland at College Park, US Robert Deng, Singapore Management University, Singapore Web Chair Cong Wang, City University of Hong Kong, Hong Kong TPC Members Elli Androulaki, IBM Research Zürich, Switzerland Erik-Oliver Blass, Airbus Group Innovations, Germany Michael Brenner, Leibniz Universität Hannover, Germany Roy Campbell, University of Illinois at Urbana-Champaign, US Ee-Chien Chang, The National University of Singapore, Singapore Sherman S. M. Chow, The Chinese University of Hong Kong, Hong Kong Charles Clancy, Virginia Tech, US Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy Shlomi Dolev, Ben-Gurion University, Israel Dario Fiore, IMDEA Software Institute, Spain Sara Foresti, Università degli Studi di Milano, Italy Félix Gómez Mármol, NEC Laboratories Europe, Germany Stefanos Gritzalis, University of the Aegean, Greece Hsu-Chun Hsiao, The National Taiwan University, Taiwan Trent Jaeger, The Pennsylvania State University, US Pramod Jamkhedkar, AT&T Labs Research, US Florian Kerschbaum, SAP Research, Germany Christopher Kruegel, University of California at Santa Barbara, US Wing Cheong Lau, The Chinese University of Hong Kong, Hong Kong Kwangsu Lee, Korea University, Korea John C.S. Lui, The Chinese University of Hong Kong, Hong Kong Aziz Mohaisen, Verisign Labs, US Refik Molva, EURECOM, France Payman Mohassel, Yahoo Labs, US Olga Ohrimenko, Microsoft Research Cambridge, UK Xinming Ou, Kansas State University, US Charalampos Papamanthou, University of Maryland at College Park, US Rahul Potharaju, Microsoft Research Redmond, US Peter Y.A. Ryan, The University of Luxembourg, Luxembourg Ahmad-Reza Sadeghi, Technische Universität Darmstadt, Germany Rei Safavi-Naini, The University of Calgary, Canada Pierangela Samarati, Università degli Studi di Milano, Italy Daniel Slamanig, Graz University of Technology, Austria Alessandro Sorniotti, IBM Research Zürich, Switzerland Anna Squicciarini, The Pennsylvania State University, US Angelos Stavrou, George Mason University, US Douglas Stebila, Queensland University of Technology, Australia Jakub Szefer, Yale University, US Roberto Tamassia, Brown University, US Marten van Dijk, The University of Connecticut, US Cong Wang, City University of Hong Kong, Hong Kong Lihua Wang, National Institute of Information and Communications Technology, Japan Wendy Hui Wang, Stevens Institute of Technology, US Zhan Wang, Chinese Academy of Sciences, China Edgar Weippl, SBA Research, Austria Qianhong Wu, Beihang University, China Jia Xu, Institute for Infocomm Research, Singapore Danfeng Yao, Virginia Tech, US Haibin Zhang, University of North Carolina at Chapel Hill, US Xinwen Zhang, Samsung Telecom America, US |
|