posted by user: javaboom || 5369 views || tracked by 4 users: [display]

DSCC 2016 : Call for Book Chapter Proposals - Data Security in Cloud Computing

FacebookTwitterLinkedInGoogle

Link: https://crow.org.nz/CFCP-DataSecCloudBook.pdf
 
When N/A
Where N/A
Abstract Registration Due Mar 13, 2016
Submission Deadline Jul 31, 2016
Notification Due Sep 19, 2016
Categories    cloud computing   cloud security   data security
 

Call For Papers

** Data Security in Cloud Computing **

Call for Book Chapter Proposals
========================================

Cloud computing is transforming the way we view and perform computing. Many organizations have already embraced this paradigm of a centralized cloud, due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. These benefits however are traded with the control of data, since data is stored, computed upon and accessed on the cloud, away from the premises of the data owner and the data user. This loss of control of data gives rise to a number of challenging data security issues, ranging from accountability, to data provenance, to identity and risk management among others. These issues have the capability to determine how effective and widespread cloud computing of the next generation is going to be and their solutions can push us into the right direction.
The book intends to provide the reader with a coverage of a wide range of issues on data security in cloud computing. It will cover issues directly related to various aspects of data security in cloud computing, along with a selection of topics on emerging technologies. The book will be published by Institute of Engineering and Technology (IET).

Topics of interest include but are not limited to:
Section 1: Data-at-Rest
1. Secure data sharing in cloud
2. Remote data integrity check for auditing in cloud
3. Data leakage in cloud
4. Data loss/resilience in cloud
5. Access control of encrypted data in cloud

Section 2: Data-in-Transit
6. Secure information flow in and out of clouds
7. Emerging cloud encryption technologies

Section 3: Data-in-Processing
8. Accountability of data in cloud
9. Secure and privacy preserving computation in cloud
10. Secure virtual environments

Section 4: Data Provenance
11. Provenance of data in cloud
12. Security attribution in and across clouds
13. Identity management in federated clouds



Section 5: Governance, Risk, Compliance
14. Risk management in clouds
15. Cloud data governance
16. Data privacy legislation and integration with technologies

Section 6: Data Security Challenges in Emerging Technologies
17. Bring your own device
18. Internet of Things
19. Cyber-physical systems
20. Vehicular ad hoc networks




BOOK CHAPTER SUBMISSION AND AUTHOR INFORMATION
Chapter Proposals
Prospective authors must submit their chapter proposals in pdf format to https://easychair.org/conferences/?conf=dataseccloudbook2016 with the following information:
1. Chapter Title
2. Author Names, Affiliations
3. Author Emails
4. Book Section/ Topic Addressed (If this is not in the list above, please suggest)
5. Chapter Extended Abstract (300 words maximum)
6. Chapter Sections/ Chapter Outline (in bullet-point form)
7. Author Biography and Relevant Experience (100 words maximum)
While this is a call for proposals, completed chapter manuscripts are also welcome.
Submission of Manuscripts for Approved Proposals

After their proposals are approved, prospective authors will be invited to submit their manuscripts electronically. Submitted manuscripts will undergo a single-blind peer-review process. To ensure the quality of accepted manuscripts, each manuscript is typically reviewed by at least two independent expert reviewers. Only accepted peer-reviewed manuscripts will be published.

Submitted manuscripts should conform to the standard guidelines of the IET book chapter format, which can be downloaded from here. Manuscripts that do not follow the formatting rules will be ignored. Manuscripts should also be written in a way that it is teaching a topic, and not just pure academic reports of research work or proposals. Vendor neutrality must be observed in the manuscripts. Survey papers of the above topics are welcome.


IMPORTANT DATES
* Chapter proposal due: 13 March 2016
* Book chapter submission: 31 July 2016
* Authors’ notification: 19 September 2016
* Chapter Camera ready version: December 2016
* Estimated publication: September 2017


BOOK EDITORS

Dr. Vimal Kumar
University of Waikato, New Zealand
vkumar@waikato.ac.nz
http://www.cms.waikato.ac.nz/people/vkumar

Dr Ryan Ko
University of Waikato, New Zealand
ryan@waikato.ac.nz
http://ryanko.org

Dr. Sivadon Chaisiri
University of Waikato, New Zealand
chaisiri@waikato.ac.nz
http://www.cms.waikato.ac.nz/people/chaisiri

Related Resources

ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ICCNS--EI 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
NLPA 2025   6th International Conference on Natural Language Processing and Applications
ICCNS 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
BDIOT 2025   2025 9th International Conference on Big Data and Internet of Things (BDIOT 2025)
CompAuto--EI 2025   2025 4th International Conference on Computers and Automation (CompAuto 2025)
NAACL 2025   North American Chapter of the Association for Computational Linguistics
VLSIA 2025   11th International Conference on VLSI and Applications