ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CCSTIM 2017 - International Workshop on Cloud Computing Security: Threats, Intelligence, and Mitigation (CCSTIM)

Date2017-12-05 - 2017-12-08

Deadline2017-08-30

VenueAustin, Texas, USA - United States USA - United States

Keywords

Websitehttps://selene.hud.ac.uk/scomsp2/CCSTIM

Topics/Call fo Papers

The cloud computing paradigm enables the sharing of computing resources for users to enjoy readily available cloud applications and services without the consumption of local resources. The number of connected devices is continually increasing, and thus is the infrastructure on which they operate. The unique attributes of cloud systems results in the introduction of many security and privacy challenges, which are further exacerbated by new developments in infrastructure and software. This workshop is a forum to bring together researchers and practitioner to discuss the latest advancements in cloud security threats, the development of novel countermeasures, and the necessity to prevent cyber threats through security-by-design.
Topics include but not restricted to:
Identification and analysis of security threats facing cloud and fog systems
Security-by-design in connected systems
The identification of security vulnerabilities and the assessment of new threats
Vulnerabilities patch and legacy applications management
Secure data management and outsourcing
Data privacy and privacy enabling mechanisms
Virtualisation security and sandboxing
Trusted computing technologies
Secured data sharing and communication among hybrid clouds
Security and identify management mechanisms
Secure programming models and the 'secure-by-design' philosophy
Security scalability for cloud and fog systems
System availability, recovery and auditing in a security context
Novel Intrusion Detection Systems (IDS)
Incident response and breach prevention technologies
Use of Artificial Intelligence within cloud and fog security
Human factors of cloud and fog security
Data privacy and security, including cryptography

Last modified: 2017-08-19 13:30:37