ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICCSM 2013 - International Conference on Cloud Security Management

Date2013-10-17 - 2013-10-18

Deadline2013-05-16

VenueSeattle, USA - United States USA - United States

Keywords

Websitehttp://academic-conferences.org

Topics/Call fo Papers

ICCSM provides an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to enhance cloud computing security management to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to cloud based information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This inaugural conference is a key event for individuals working in the field from around the world.
As organizations rush to adopt Cloud Computing at a rate faster than originally projected , it is safe to predict that, over the coming years, Cloud Computing will have major impacts, not only on the way we conduct science and research, but also on the quality of our daily human lives. Computation research, education, and business communities have been exploring the potential benefits of Cloud Computing and the changes these imply. Experts have predicted that the move to the cloud will alter significantly the content of IT jobs, with cloud clients needing fewer hands-on skills and more skills that administer and manage information. Bill Gates was recently quoted: “How you gather, manage, and use information will determine whether you win or lose .” Cloud Computing impacts will be broad and pervasive, applying to public and private institutions alike.
Regardless of the rate of uptake, Cloud Computing has raised concerns. Despite the fact that it has huge potential for changing computation methods for better and provides tremendous research and commercial opportunities, it also creates great challenges to IT infrastructure, IT and computation management and policy, industry regulation, governance, the legal infrastructure and?of course?to information security and privacy. Wikileaks demonstrated the ease with which a massive set of confidential documents, collected and maintained in digital form, can be disseminated. The move to the cloud poses an even greater challenge, aggregating even more massive amounts of information, opening up even greater vulnerabilities, before we have even gained an understanding of the security implications.
Accordingly, this conference is designed to seize the opportunity to deliberate Cloud Security issues in the Pacific Northwest where the cloud is forming physically. The purpose is to provide a scientific forum for members from the academic, research, and industry communities 1) to discuss emerging concerns, recent advances, and future challenges in the area of security and privacy in the Cloud and 2) to share potential solutions to the challenging questions that are motivating Cloud Computing education, research, and commercialization. What better place to explore these ideas?
Publication opportunity
Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.
The advisory group for the conference invites submissions of both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Academic research papers, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).
Topics of interest include, but are not limited to:
Cloud Reference Architecture
Cloud systems and tools
Cloud wireless sensor networks
Cloud-centric Mobile security
Bring Your Own Device, Mobile Device Management
Design, implementation and performance evaluation for cloud applications
Security for emerging cloud programming models
Web services supporting cloud computing
Models, methodologies and tools for web services
Cloud-delivered security services
Cryptographic protocols for cloud security
Cloud threat/attack/vulnerability models
Big Data in the Cloud
Managing and administering information in the Cloud
Reliability, Fault Tolerance, Quality-of-Service
Service Level Agreements and Performance Measurement
Security, integrity and privacy for Cloud Computing
Trust and policy management in the Cloud
Secure Identity Access Management
Governance, Risk and Compliance
New standards, guidelines, best practices for security and privacy in the Cloud
Security risk models for cloud computing
Cloud Computing Market Maturity
Cost and economic models for security in the Cloud
Legal issues in the Cloud
Incident Response in the Cloud
Cloud forensics and e-discovery
Case studies on Cloud Computing adoption
Use of Cloud Computing for Education

Last modified: 2012-09-15 20:56:44