DOA 2014 - fourth International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures
Topics/Call fo Papers
DOA-Cloud and Trusted Computing 2014 is the fourth International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as a component conference of the OnTheMove Federated Conferences & Workshops.
Current and future software needs remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for the internet- and intranet-based systems in organizations, and cover a very wide range of application domains as well as technology and research issues. This has found realization through Cloud Computing. Vital element in such networked information systems are the notions of Trust, Security, Privacy and Risk.
This conference therefore is devoted to research in the topics of:
? Cloud Computing
? Trust, Security, Privacy and Risk
It also allows a special focus on the intersection of these two broad areas bringing together experts from the two communities to focus on the vital issue of trust, security, privacy and risk in Cloud Computing.
TOPICS OF INTEREST
For 2014, the following themes to be addressed by novel research have been identified:
Cloud Data Management:
? Database as a Service, Multi-tenancy, Data management and analytics as a service
? Elasticity and Scalability for Cloud Data Management Systems
? Virtualization and Cloud databases, Storage Structures and Indexing
? Big Data, Frameworks and Systems for Parallel and Distributed Computing
? Data Science and Scalable Machine Learning
? Resource and Workload Management in Cloud Databases
? High Availability and Reliability
? Transactional Models for Cloud Databases, Consistency and Replication
? New Protocols, Interfaces and Data Models for Cloud Databases
? Service Level Agreements
? Interoperability between Clouds
Cloud Computing Infrastructures and Architectures:
? Cloud Resource provisioning with QoS Guarantees
? Virtualized Computing Infrastructures
? Datacenter Architecture and Management
? Cloud Operation and Resource Management
? Cloud Performance Modeling and Benchmarks
? Formal methods and Tools for Cloud computing
? Infrastructures for Social Computing and Networking
Cloud Computing Applications:
? Service Level Agreements and Performance Measurement
? New Parallel / Concurrent Programming Models for Cloud Computing
? Reliability, Fault Tolerance, Quality-of-Service
? Service-Oriented Architectures, RESTful Services in Cloud Environments
? Pervasive / Ubiquitous Computing in the Cloud
? Large Scale Cloud Applications, Reality Mining
? Clouds and Social Media, Network and Link Analysis
? Cloud Business Applications and Case Studies
Trust, Security, Privacy and Risk
? Autonomic Computing Theory, Models, Architectures and Communications
? Cryptographic Algorithms and Protocols
? Network Security
? Identity and Trust Management
? Trust Evaluation and Prediction in Service oriented Environments
? Security Models and Quantifications
? Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, etc.
? Self-protection and Intrusion-detection in Security
? DRM, Watermarking Technology, IP Protection
? Context-aware Access Control
? Virus Detections and Anti-virus Techniques/Software
? Cyber Attack, Crime and Cyber War
? Human Interaction with Trusted and Autonomic Computing Systems
? Security, Dependability and Autonomic Issues in Ubiquitous Computing
? Reliable Computing and Trusted Computing
? Wireless Emergency and Security Systems
? Multimedia Security Issues over Mobile and Wireless Networks
? Software Architectures and Design for Trusted Emerging Systems
? Risk evaluation and Management
? Privacy
? Cloud Computing with Autonomic and Trusted Environment
Security and Trust in Cloud Computing:
? Algorithms and Computations on Encrypted Data
? Cloud Trust, Security, Privacy and Confidentiality
? Cloud Access Control and Authentication
? Privilege Management Infrastructure
? Networks of Trust, Clouds of Trust
? Trusted Computing in virtualised environments
? End-to-end security over complex cloud supply chain
MOTIVATION
Distributed computation is undergoing a radical paradigm shift, where users and developers alike are becoming fully decoupled from the technology infrastructure where their applications are executed. Computations details are abstracted by an increasingly deep virtualization layer, veiling distributed execution by means of the same "cloud" that supports it. Together, the notion of Cloud Computing and the related one of service-orientation are enabling new business models based on the seamless provision of dynamically scalable, virtualized resources as services made available “over the cloud”, to be accessed via a web browser.
For this vision to be realized, a number of problems need to be solved, involving the nuts-and-bolts of virtualization as well as the reliability, scalability, security and distribution transparency of cloud-based computations, and the abstractions leading their development (e.g. service composition versus on-line architectural transformations). Along with the rapid evolution of these fields, the Cloud vision requires a huge research and development effort in the underlying technologies, whose advances will broaden the scope of the Cloud's applicability.
DOA-Cloud and Trusted Computing 2014will investigate all issues related to the potential of the Cloud notion as a metaphor for the future Internet Services, providing semantically rich service descriptions and seamless interfaces to (virtual images of) locally held devices and other technologies such as the traditional Web, distributed datacenters and peer-to-peer systems.
IMPORTANT DATES
? Conference Abstract Submission Deadline: June 15, 2014
? Conference Paper Submission Deadline: June 22, 2014
? Acceptance Notification: Aug 06, 2014
? Camera Ready Due: Aug 20, 2014
? Author Registration Due: Aug 20, 2014
SUBMISSION GUIDELINES
Full Papers
Regular paper submissions to DOA-Cloud and Trusted Computing 2014must present original, highly innovative, prospective and forward-looking research in one or more of the themes given above. Full papers must break new ground, present new insight, deliver a significant research contribution and provide validated support for its results and conclusions. Successful submissions typically represent a major advance for the field of cloud computing, referencing and relating the contribution to existing research work, giving a comprehensive, detailed and understandable explanation of a system, study, theory or methodology, and support the findings with a compelling evaluation and/or validation. Each paper must be submitted as a single PDF file in Springer Lecture Notes in Computer Science format (not longer than eighteen pages in length). Accepted regular papers will be included in the printed conference main proceedings and presented in the paper sessions. Submissions to DOA-Cloud and Trusted Computing 2014must not be under review by any other conference or publication during the DOA-Cloud and Trusted Computing 2014review cycle, and must not be previously published or accepted for publication elsewhere.
Notes
Notes (not longer than six pages in length) must report new results and provide support for the results, as a novel and valuable contribution to the field ? just like full papers. Notes are intended for succinct work that is nonetheless in a mature state ready for inclusion in archival proceedings. Notes will be held to the same standard of scientific quality as full papers, albeit for a shorter presentation, and must still state how they fit with respect to related work, and provide a compelling explanation and validation. Notes must be submitted as single PDF file in in Springer Lecture Notes in Computer Science format. Accepted notes will be published in the conference main proceedings and will be presented in the paper sessions of the conference.
A selection of the best papers from DOA-Cloud and Trusted Computing 2014will be published in a special issue of The International Journal of Computer Systems Science and Engineering
Paper submission site: TBA
Paper Formatting and Presenting
The paper and notes submission site giving all the relevant submission details is located at:http://www.onthemove-conferences.org/index.php/aut.... Failure to comply with the formatting instructions for submitted papers or notes will lead to the outright rejection of the paper without review. Failure to commit to presentation at the conference automatically excludes a paper from the proceedings.
Program Committee ? To be confirmed
Norbert Ritter, Universität Hamburg, Germany
Makoto Takizawa, Seikei University, Tokyo, Japan
VolkmarLotz, SAP Research, Sofia Antipolis, FranceMarco Casassa Mont, HP Labs
David Chadwick, University of Kent
Luwei Cheng, University of Hong Kong
Cheng-Kang Chu, Institute for Infocom Research
Alfredo Cuzzocrea, ICAR-CNR & University of Calabria
Stefan Deßloch, Universität Kaiserslautern
Changyu Dong, University of Strathclyde
ScharamDustdar, Technical University of Vienna
Alex Garthwaite, CloudPhysics
ChingHsien (Robert) Hsu, Chung Hua University
Iulia Ion, ETH Zurich
Martin Jaatun, SINTEF
Florian Kerschbaum, TU Dresden
Ryan Ko, The University of Waikato
Tim Kraska, Brown University
Kai Kunze, University of Passau
Zhiqiang Lin, University of Texas at Dallas
Joe Loyall, BBN Technologies
Gregorio Martinez, University of Murcia
BarzanMozafari, Massachusetts Insititute of Technology
Jiannan Ouyang, University of Pittsburgh
Nohhyun Park, University of Minnesota
Peter Pietzuch, Imperial College London
Siani Pearson, HP Labs
Aravind Prakash, Syracuse University
Smriti R. Ramakrishnan, Oracle Corporation
Christoph Reich, FurtwangenHochschule University
Russell Sears, Microsoft
Ramesh K. Sitaraman, UMass Amherst
Charalabos Skianis, University of Aegean
Anthony Sulistio, High Performance Computing Center
Andreas Thor, Uni Leipzig
Bhavani Thuraisingham, University of Texas at Dallas
Venkatanathan Varadarajan, University of Wisconsin-Madison
Heng Yin, Syracuse University NY
Yuan Yu, Microsoft Research
Current and future software needs remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for the internet- and intranet-based systems in organizations, and cover a very wide range of application domains as well as technology and research issues. This has found realization through Cloud Computing. Vital element in such networked information systems are the notions of Trust, Security, Privacy and Risk.
This conference therefore is devoted to research in the topics of:
? Cloud Computing
? Trust, Security, Privacy and Risk
It also allows a special focus on the intersection of these two broad areas bringing together experts from the two communities to focus on the vital issue of trust, security, privacy and risk in Cloud Computing.
TOPICS OF INTEREST
For 2014, the following themes to be addressed by novel research have been identified:
Cloud Data Management:
? Database as a Service, Multi-tenancy, Data management and analytics as a service
? Elasticity and Scalability for Cloud Data Management Systems
? Virtualization and Cloud databases, Storage Structures and Indexing
? Big Data, Frameworks and Systems for Parallel and Distributed Computing
? Data Science and Scalable Machine Learning
? Resource and Workload Management in Cloud Databases
? High Availability and Reliability
? Transactional Models for Cloud Databases, Consistency and Replication
? New Protocols, Interfaces and Data Models for Cloud Databases
? Service Level Agreements
? Interoperability between Clouds
Cloud Computing Infrastructures and Architectures:
? Cloud Resource provisioning with QoS Guarantees
? Virtualized Computing Infrastructures
? Datacenter Architecture and Management
? Cloud Operation and Resource Management
? Cloud Performance Modeling and Benchmarks
? Formal methods and Tools for Cloud computing
? Infrastructures for Social Computing and Networking
Cloud Computing Applications:
? Service Level Agreements and Performance Measurement
? New Parallel / Concurrent Programming Models for Cloud Computing
? Reliability, Fault Tolerance, Quality-of-Service
? Service-Oriented Architectures, RESTful Services in Cloud Environments
? Pervasive / Ubiquitous Computing in the Cloud
? Large Scale Cloud Applications, Reality Mining
? Clouds and Social Media, Network and Link Analysis
? Cloud Business Applications and Case Studies
Trust, Security, Privacy and Risk
? Autonomic Computing Theory, Models, Architectures and Communications
? Cryptographic Algorithms and Protocols
? Network Security
? Identity and Trust Management
? Trust Evaluation and Prediction in Service oriented Environments
? Security Models and Quantifications
? Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, etc.
? Self-protection and Intrusion-detection in Security
? DRM, Watermarking Technology, IP Protection
? Context-aware Access Control
? Virus Detections and Anti-virus Techniques/Software
? Cyber Attack, Crime and Cyber War
? Human Interaction with Trusted and Autonomic Computing Systems
? Security, Dependability and Autonomic Issues in Ubiquitous Computing
? Reliable Computing and Trusted Computing
? Wireless Emergency and Security Systems
? Multimedia Security Issues over Mobile and Wireless Networks
? Software Architectures and Design for Trusted Emerging Systems
? Risk evaluation and Management
? Privacy
? Cloud Computing with Autonomic and Trusted Environment
Security and Trust in Cloud Computing:
? Algorithms and Computations on Encrypted Data
? Cloud Trust, Security, Privacy and Confidentiality
? Cloud Access Control and Authentication
? Privilege Management Infrastructure
? Networks of Trust, Clouds of Trust
? Trusted Computing in virtualised environments
? End-to-end security over complex cloud supply chain
MOTIVATION
Distributed computation is undergoing a radical paradigm shift, where users and developers alike are becoming fully decoupled from the technology infrastructure where their applications are executed. Computations details are abstracted by an increasingly deep virtualization layer, veiling distributed execution by means of the same "cloud" that supports it. Together, the notion of Cloud Computing and the related one of service-orientation are enabling new business models based on the seamless provision of dynamically scalable, virtualized resources as services made available “over the cloud”, to be accessed via a web browser.
For this vision to be realized, a number of problems need to be solved, involving the nuts-and-bolts of virtualization as well as the reliability, scalability, security and distribution transparency of cloud-based computations, and the abstractions leading their development (e.g. service composition versus on-line architectural transformations). Along with the rapid evolution of these fields, the Cloud vision requires a huge research and development effort in the underlying technologies, whose advances will broaden the scope of the Cloud's applicability.
DOA-Cloud and Trusted Computing 2014will investigate all issues related to the potential of the Cloud notion as a metaphor for the future Internet Services, providing semantically rich service descriptions and seamless interfaces to (virtual images of) locally held devices and other technologies such as the traditional Web, distributed datacenters and peer-to-peer systems.
IMPORTANT DATES
? Conference Abstract Submission Deadline: June 15, 2014
? Conference Paper Submission Deadline: June 22, 2014
? Acceptance Notification: Aug 06, 2014
? Camera Ready Due: Aug 20, 2014
? Author Registration Due: Aug 20, 2014
SUBMISSION GUIDELINES
Full Papers
Regular paper submissions to DOA-Cloud and Trusted Computing 2014must present original, highly innovative, prospective and forward-looking research in one or more of the themes given above. Full papers must break new ground, present new insight, deliver a significant research contribution and provide validated support for its results and conclusions. Successful submissions typically represent a major advance for the field of cloud computing, referencing and relating the contribution to existing research work, giving a comprehensive, detailed and understandable explanation of a system, study, theory or methodology, and support the findings with a compelling evaluation and/or validation. Each paper must be submitted as a single PDF file in Springer Lecture Notes in Computer Science format (not longer than eighteen pages in length). Accepted regular papers will be included in the printed conference main proceedings and presented in the paper sessions. Submissions to DOA-Cloud and Trusted Computing 2014must not be under review by any other conference or publication during the DOA-Cloud and Trusted Computing 2014review cycle, and must not be previously published or accepted for publication elsewhere.
Notes
Notes (not longer than six pages in length) must report new results and provide support for the results, as a novel and valuable contribution to the field ? just like full papers. Notes are intended for succinct work that is nonetheless in a mature state ready for inclusion in archival proceedings. Notes will be held to the same standard of scientific quality as full papers, albeit for a shorter presentation, and must still state how they fit with respect to related work, and provide a compelling explanation and validation. Notes must be submitted as single PDF file in in Springer Lecture Notes in Computer Science format. Accepted notes will be published in the conference main proceedings and will be presented in the paper sessions of the conference.
A selection of the best papers from DOA-Cloud and Trusted Computing 2014will be published in a special issue of The International Journal of Computer Systems Science and Engineering
Paper submission site: TBA
Paper Formatting and Presenting
The paper and notes submission site giving all the relevant submission details is located at:http://www.onthemove-conferences.org/index.php/aut.... Failure to comply with the formatting instructions for submitted papers or notes will lead to the outright rejection of the paper without review. Failure to commit to presentation at the conference automatically excludes a paper from the proceedings.
Program Committee ? To be confirmed
Norbert Ritter, Universität Hamburg, Germany
Makoto Takizawa, Seikei University, Tokyo, Japan
VolkmarLotz, SAP Research, Sofia Antipolis, FranceMarco Casassa Mont, HP Labs
David Chadwick, University of Kent
Luwei Cheng, University of Hong Kong
Cheng-Kang Chu, Institute for Infocom Research
Alfredo Cuzzocrea, ICAR-CNR & University of Calabria
Stefan Deßloch, Universität Kaiserslautern
Changyu Dong, University of Strathclyde
ScharamDustdar, Technical University of Vienna
Alex Garthwaite, CloudPhysics
ChingHsien (Robert) Hsu, Chung Hua University
Iulia Ion, ETH Zurich
Martin Jaatun, SINTEF
Florian Kerschbaum, TU Dresden
Ryan Ko, The University of Waikato
Tim Kraska, Brown University
Kai Kunze, University of Passau
Zhiqiang Lin, University of Texas at Dallas
Joe Loyall, BBN Technologies
Gregorio Martinez, University of Murcia
BarzanMozafari, Massachusetts Insititute of Technology
Jiannan Ouyang, University of Pittsburgh
Nohhyun Park, University of Minnesota
Peter Pietzuch, Imperial College London
Siani Pearson, HP Labs
Aravind Prakash, Syracuse University
Smriti R. Ramakrishnan, Oracle Corporation
Christoph Reich, FurtwangenHochschule University
Russell Sears, Microsoft
Ramesh K. Sitaraman, UMass Amherst
Charalabos Skianis, University of Aegean
Anthony Sulistio, High Performance Computing Center
Andreas Thor, Uni Leipzig
Bhavani Thuraisingham, University of Texas at Dallas
Venkatanathan Varadarajan, University of Wisconsin-Madison
Heng Yin, Syracuse University NY
Yuan Yu, Microsoft Research
Other CFPs
- 22nd International Conference on COOPERATIVE INFORMATION SYSTEMS (CoopIS 2014)
- The conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems
- TUTORIAL on Spatial Modulation for MIMO Wireless Systems
- SPECIAL SESSION on ?RGB-D: Open Issues and Applications?
- SPECIAL SESSION on ?Network Coding and Applications?
Last modified: 2014-04-05 16:50:53