CCSW 2011 - CCSW 2011: The ACM Cloud Computing Security Workshop
Topics/Call fo Papers
Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:
practical cryptographic protocols for cloud security
secure cloud resource virtualization mechanisms
secure data management outsourcing (e.g., database as a service)
practical privacy and integrity mechanisms for outsourcing
foundations of cloud-centric threat models
secure computation outsourcing
remote attestation mechanisms in clouds
sandboxing and VM-based enforcements
trust and policy management in clouds
secure identity management mechanisms
new cloud-aware web service security paradigms and mechanisms
cloud-centric regulatory compliance issues and mechanisms
business and security risk models and clouds
cost and usability models and their interaction with security in clouds
scalability of security in global-size clouds
trusted computing technology and clouds
binary analysis of software for remote attestation and cloud protection
network security (DOS, IDS etc.) mechanisms for cloud contexts
security for emerging cloud programming models
energy/cost/efficiency of security in clouds
We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.
practical cryptographic protocols for cloud security
secure cloud resource virtualization mechanisms
secure data management outsourcing (e.g., database as a service)
practical privacy and integrity mechanisms for outsourcing
foundations of cloud-centric threat models
secure computation outsourcing
remote attestation mechanisms in clouds
sandboxing and VM-based enforcements
trust and policy management in clouds
secure identity management mechanisms
new cloud-aware web service security paradigms and mechanisms
cloud-centric regulatory compliance issues and mechanisms
business and security risk models and clouds
cost and usability models and their interaction with security in clouds
scalability of security in global-size clouds
trusted computing technology and clouds
binary analysis of software for remote attestation and cloud protection
network security (DOS, IDS etc.) mechanisms for cloud contexts
security for emerging cloud programming models
energy/cost/efficiency of security in clouds
We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.
Other CFPs
- 4th ACM Workshop on Artificial Intelligence and Security
- Workshop on Privacy in the Electronic Society (WPES)
- Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
- 4th Workshop on Artificial Intelligence and Machine Learning in Security
- 25th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems 2012
Last modified: 2011-04-29 12:04:11