posted by user: alex_egner || 7014 views || tracked by 6 users: [display]

AU2EU 2015 : Workshop on Security and Privacy in Cloud-based Applications

FacebookTwitterLinkedInGoogle

Link: http://www.ares-conference.eu/conference/ares-eu-symposium/au2eu/
 
When Aug 24, 2015 - Aug 28, 2015
Where Toulouse, France
Submission Deadline May 8, 2015
Notification Due Jun 1, 2015
Final Version Due Jun 15, 2015
Categories    security   privacy   cloud   cryptography
 

Call For Papers

************************************************************************
Workshop on Security and Privacy in Cloud-based Applications (in conjunction with ARES EU Projects Symposium 2015)
Université Paul Sabatier, Toulouse, France, August 24th – 28th, 2015
http://www.ares-conference.eu/conference/ares-eu-symposium/au2eu/
************************************************************************

Cloud services and cloud-based applications have become increasingly popular in the recent years. Security and privacy of the cloud-based applications have always been major roadblock for wide use of cloud services that involve sensitive data. Therefore this research field attracts a lot of attention from the academia and industry. The aim of the workshop is to provide the environment to exchange ideas and to foster discussions on a broad list of aspects related to privacy and security of cloud-based applications, and to find answers to questions like: How do we design authentication and authorization frameworks for cross-cloud environments, supporting different identity/attribute providers and organizational policies while guaranteeing privacy, security and trust? How can we extend current solutions with higher assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption techniques to address specific security and confidentiality requirements of large distributed infrastructures? What is the best way to validate practical aspects of the cloud-based applications, such as scalability, efficiency, maturity and usability?

Next to regular sessions with research papers, the workshop will include an invited talk as well as a round table on “Evolution of privacy-preserving authentication and authorization tools: from concepts to deployment“, presenting the results of the FP7 AU2EU project (http://www.au2eu.eu/).

CONFERENCE TOPICS
The conference topics include, but are not limited to:

- Privacy-preserving Authentication
- Attribute-based Authorization
- Integrated Authentication and Authorization
- Assurance of Claims
- Crypto-based Policy Enforcement
- Attribute-based Encryption
- Secure Data Management
- Key Management
- Trust Management
- Operations under Encryption
- Homomorphic Encryption
- Searchable Encryption
- Privacy-Preserving Data Mining
- Security as a Service
- Big Data Security

PAPER SUBMISSIONS
The proceedings of ARES 2014, published by Conference Publishing Services (CPS), are available here in the IEEE XPlore Digital Library.
Authors are invited to submit research and application papers according the following guidelines: 8 pages (a maximum of 10 pages is tolerated), two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.
Submitted papers will be carefully evaluated based on originality, significance, technical soundness, presentation and clarity of exposition.
Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them.
Contact author must provide the following information at the ARES conference system: paper title, authors’ names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.
Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.
Double blind review: ARES requires anonymized submissions – please make sure that submitted papers contain no author names or obvious self-references.
Details about submission can be found here: http://www.ares-conference.eu/conference/conference/submission/

IMPORTANT DATES
Submission Deadline May 8, 2015
Author Notification June 1, 2015
Proceedings Version June 8, 2015
Conference August 24-28, 2015


PROGRAM CHAIRS
- Milan Petkovic (General Chair), Philips Research / Eindhoven University of Technology – Netherlands
- Jan Camenisch (Program Co-Chair), IBM Research – Zurich, Switzerland
- John Zic (Program Co-Chair), CSIRO – Sydney, Australia
- Alexandru Egner (Organization Co-Chair), Eindhoven University of Technology – Netherlands

PROGRAM COMMITTEE
- Giuseppe Ateniese, Sapienza University of Rome, Italy
- George Danezis, University College London, UK
- Refik Molva, EURECOM, France
- Gerrit Bleumer, Scheidt & Bachmann, Germany
- Ljiljana Brankovic, University of Newcastle, Australia
- Jeroen Doumen, Irdeto, Netherlands
- Csilla Farkas, University of South Carolina, USA
- Pietro Colombo, University of Insubria, Italy
- Simone Fischer-Hubner, Karlstad University, Sweden
- Dieter Gollmann, Hamburg University of Technology, Germany
- Tanya Ignatenko, Eindhoven University of Technology, Netherlands
- Mizuho Iwaihara, Waseda University, Japan
- Sushil Jajodia, George Mason University, USA
- Nguyen Manh Tho, Vienna University of Technology, Austria
- Guenther Pernul, University of Regensburg, Germany
- Bart Preneel, KU Leuven, Belgium
- Kai Rannenberg, Goethe University Frankfurt, Germany
- Ahmad-Reza Sadeghi, Darmstadt University, Germany
- Andreas Schaad, Huawei Research
- Yuan Zhang, State University of New York at Buffalo, USA
- Sabrina De Capitani di Vimercati, University of Milan, Italy


For any questions, please contact the organization co-chair:
a.i.egner@tue.nl

Related Resources

ICDPA 2025   2025 The 11th International Conference on Data Processing and Applications (ICDPA 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
IJCSITY 2024   International Journal of Computational Science and Information Technology
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
CCGrid 2025   The 25th IEEE international Symposium on Cluster, Cloud and Internet Computing
ICCIA--EI 2025   2025 10th International Conference on Computational Intelligence and Applications (ICCIA 2025)