SCC 2013 - The 2013 International Workshop on Security in Cloud Computing
Topics/Call fo Papers
Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. This workshop aims to bring together the research efforts from both the academia and industry in all security aspects related to cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. Topics of interests include (but are not limited to) the following subject categories:
Secure cloud architecture
Cloud access control and key management
Identification and privacy in cloud
Integrity assurance for data outsourcing
Integrity and verifiable computation
Computation over encrypted data
Software and data segregation security
Secure management of virtualized resources
Trusted computing technology
Joint security and privacy aware protocol design
Failure detection and prediction
Secure data management within and across data centers
Availability, recovery and auditing
Secure computation outsourcing
Secure mobile cloud
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing.
Important Dates
Submissions Deadline: Feb. 1, 2013
Notification Date: Feb. 27, 2013
Final Submission Date: Mar. 10, 2013
Workshop: May 7, 2013
Submission
Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.
Electronic submission site: https://www.easychair.org/conferences/?conf=asiacc...
Program
TBA
Organizers
General Chair
Xingming Sun, Nanjing University of Information Science & Technology
Program Co-Chairs
Elaine Shi, University of Maryland, College Park
Kui Ren, State University of New York, Buffalo
Web and Publicity Chair
Cong Wang, City University of Hong Kong
TPC Members
Gail-Joon Ahn, Arizona State University
Ning Cao, Google Inc.
Richard Chow, Samsung Research
Reza Curtmola, New Jersey Institute of Technology
Roberto Di Pietro, Università di Roma Tre
Xuhua Ding, Singapore Management University
Sara Foresti, Università degli Studi di Milano
Keesook Han, Air Force Research Laboratory
Ragib Hasan, University of Alabama at Birmingham
Dijiang Huang, Arizona State University
Yan Huang, University of Virginia and University of Maryland
Xuejia Lai, Shanghai Jiao Tong University
Xiehua Li, Hunan University
Yao Liu, University of South Florida
Rongxing Lu, University of Waterloo
Di Ma, University of Michigan-Dearborn
Abedelaziz Mohaisen, Verisign Labs
Charalampos Papamanthou, UC Berkeley
Ning Qu, Google Inc.
Eleanor Rieffel, FXPAL
Anna Squicciarini, The Pennsylvania State University
Jinyuan Sun, The University of Tennessee, Knoxville
Jakub Szefer, Princeton University
Cong Wang, City University of Hong Kong
Qian Wang, Wuhan University
Zhi Wang, Florida State University
Tao Wei, UC Berkeley and Peking University
Jian Weng, Jinan University
Hui Xue, UC Berkeley
Siu-Ming Yiu, The University of Hong Kong
Shucheng Yu, University of Arkansas at Little Rock
Bingsheng Zhang, State University of New York, Buffalo
Hong-Sheng Zhou, University of Maryland, College Park
Yan Zhu, Peking University
Secure cloud architecture
Cloud access control and key management
Identification and privacy in cloud
Integrity assurance for data outsourcing
Integrity and verifiable computation
Computation over encrypted data
Software and data segregation security
Secure management of virtualized resources
Trusted computing technology
Joint security and privacy aware protocol design
Failure detection and prediction
Secure data management within and across data centers
Availability, recovery and auditing
Secure computation outsourcing
Secure mobile cloud
Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing.
Important Dates
Submissions Deadline: Feb. 1, 2013
Notification Date: Feb. 27, 2013
Final Submission Date: Mar. 10, 2013
Workshop: May 7, 2013
Submission
Submissions must be written in English with at most 8 pages including the bibliography and appendices. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM DigitalLibrary.
Electronic submission site: https://www.easychair.org/conferences/?conf=asiacc...
Program
TBA
Organizers
General Chair
Xingming Sun, Nanjing University of Information Science & Technology
Program Co-Chairs
Elaine Shi, University of Maryland, College Park
Kui Ren, State University of New York, Buffalo
Web and Publicity Chair
Cong Wang, City University of Hong Kong
TPC Members
Gail-Joon Ahn, Arizona State University
Ning Cao, Google Inc.
Richard Chow, Samsung Research
Reza Curtmola, New Jersey Institute of Technology
Roberto Di Pietro, Università di Roma Tre
Xuhua Ding, Singapore Management University
Sara Foresti, Università degli Studi di Milano
Keesook Han, Air Force Research Laboratory
Ragib Hasan, University of Alabama at Birmingham
Dijiang Huang, Arizona State University
Yan Huang, University of Virginia and University of Maryland
Xuejia Lai, Shanghai Jiao Tong University
Xiehua Li, Hunan University
Yao Liu, University of South Florida
Rongxing Lu, University of Waterloo
Di Ma, University of Michigan-Dearborn
Abedelaziz Mohaisen, Verisign Labs
Charalampos Papamanthou, UC Berkeley
Ning Qu, Google Inc.
Eleanor Rieffel, FXPAL
Anna Squicciarini, The Pennsylvania State University
Jinyuan Sun, The University of Tennessee, Knoxville
Jakub Szefer, Princeton University
Cong Wang, City University of Hong Kong
Qian Wang, Wuhan University
Zhi Wang, Florida State University
Tao Wei, UC Berkeley and Peking University
Jian Weng, Jinan University
Hui Xue, UC Berkeley
Siu-Ming Yiu, The University of Hong Kong
Shucheng Yu, University of Arkansas at Little Rock
Bingsheng Zhang, State University of New York, Buffalo
Hong-Sheng Zhou, University of Maryland, College Park
Yan Zhu, Peking University
Other CFPs
- ACM Asia Public-Key Cryptography Workshop
- Seventh International Frontiers of Algorithmics Workshop (FAW 2013) and The Ninth International Conference on Algorithmic Aspects of Information and Management (AAIM 2013)
- 17th International Conference on Intelligence in Next Generation Networks
- 2013 International Conference on Advanced ICT(Information and Communication Technology) for Business and Management (ICAICTBM2013)
- 4th International Workshop on Modeling Social Media (MSM'2013)
Last modified: 2013-01-09 22:57:42