ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CCSW 2013 - The ACM Cloud Computing Security Workshop

Date2013-11-08

Deadline2013-07-23

VenueBerlin , Germany Germany

Keywords

Websitehttps://digitalpiglet.org/nsac/ccsw13/

Topics/Call fo Papers

Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:
practical cryptographic protocols for cloud security
secure cloud resource virtualization mechanisms
secure data management outsourcing (e.g., database as a service)
practical privacy and integrity mechanisms for outsourcing
foundations of cloud-centric threat models
secure computation outsourcing
remote attestation mechanisms in clouds
sandboxing and VM-based enforcements
trust and policy management in clouds
secure identity management mechanisms
new cloud-aware web service security paradigms and mechanisms
cloud-centric regulatory compliance issues and mechanisms
business and security risk models and clouds
cost and usability models and their interaction with security in clouds
scalability of security in global-size clouds
trusted computing technology and clouds
binary analysis of software for remote attestation and cloud protection
network security (DOS, IDS etc.) mechanisms for cloud contexts
security for emerging cloud programming models
energy/cost/efficiency of security in clouds
We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.

Last modified: 2013-05-29 23:23:15