ICCCC 2014 - International Conference on International Conference on Cloud Computing & Cryptography ICCCC’14
Date2014-06-14 - 2014-06-16
Deadline2014-04-21
VenueSousse, Tunisia
Keywords
Websitehttps://www.gscit.org/icccc
Topics/Call fo Papers
Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. The Cloud computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure. In order for this to become reality, however, there are still some challenges to be solved. Most important among these are security and trust issues,since the users data has to be released to the Cloud and thus leaves the protection sphere of the data owner.In contrast to traditional solutions, where the IT services are under proper physical,logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy.
Cloud computing security using encryption technique
Geethu Thomas, Prem Jose V, P.Afsar
Oct 2013
Conference Topics of interest include, but are not limited to:
Novel cryptographic protocols
ID-based and certificateless cryptosystems
Broadcast encryption, signcryption, etc
Designed confirmer or undeniable signatures
Identification / authentication schemes
Key agreement
Predicate encryption
SW / HW implementation
Secure operating systems
Efficient software implementation
FPGA or ASIC implementation
RFID security
Middleware security
Cloud Computing
Cloud Application Architectures
Cloud Application Scalability and Availability
Cloud Applications Performance and Monitoring
Cloud Domain
Cloud Middleware Frameworks
Cloud Traffic Characterization and Measurements
Cloud Traffic Engineering and Control-Plane Architectures
Cloudsourcing
Collective Intelligence/Crowd Computing
Context-aware Computing and Peer to Peer Computing
Context-Awareness and its Data Mining
Cyber Security
Data Center Network Management, Reliabilty, Optimization
Data Center Operations
Data Grids
Data Models for Production Systems and Services
Defence Systems
Development Methods for Cloud Applications
Disaster Recovery
Distributed Data Center Architectures and Services
Distributed Information Systems
Cloud Applications & Secure Environments
e-Business
e-Commerce
e-Governance
e-Government
e-Learning
e-Society
Green Cloud Networking
Incident Response Issues
Internet Architecture
Internet of Services
Internet of things
Internet Routing of Cloud data
Internet technologies
Intra-Cloud vs Inter-Cloud Management
IPSec Quality of Service
Load Balancing
MANET Security
Mobile Cloud Networking, Follow-Me-Cloud
Network on the fly, Virtual control, Virtual radio, Isolation
New Novel Mechanism and Application for Cloud Computing
Outsourced Production Environments
Peer to Peer Data Management
Performance Development and Management
Secure Communications
Security and Data Management
Security Challenges and Content Authoring
Security Stack
Security, Privacy, Confidentiality in Cloud networking
Semantic Web Technologies
Service and Systems Design and QoS Network Security
Service Composition
Service Discovery
Service Innovation
Service Marketing and Management
Service Modeling and Specification
Service Monitoring and Control
Service Strategy
Smart Homes and its Business Model
Storage Area Networks, Optical Interconnect, Fiber Channel
Technology-Enabled Information
Trust, Privacy and Data Security
Ubiquitous Systems
Virtual Ethernet Switching, Data Center Bridging
Virtualization of Wireless Equipment
Web Services
Wireless Sensor Network Security
Cloud computing security using encryption technique
Geethu Thomas, Prem Jose V, P.Afsar
Oct 2013
Conference Topics of interest include, but are not limited to:
Novel cryptographic protocols
ID-based and certificateless cryptosystems
Broadcast encryption, signcryption, etc
Designed confirmer or undeniable signatures
Identification / authentication schemes
Key agreement
Predicate encryption
SW / HW implementation
Secure operating systems
Efficient software implementation
FPGA or ASIC implementation
RFID security
Middleware security
Cloud Computing
Cloud Application Architectures
Cloud Application Scalability and Availability
Cloud Applications Performance and Monitoring
Cloud Domain
Cloud Middleware Frameworks
Cloud Traffic Characterization and Measurements
Cloud Traffic Engineering and Control-Plane Architectures
Cloudsourcing
Collective Intelligence/Crowd Computing
Context-aware Computing and Peer to Peer Computing
Context-Awareness and its Data Mining
Cyber Security
Data Center Network Management, Reliabilty, Optimization
Data Center Operations
Data Grids
Data Models for Production Systems and Services
Defence Systems
Development Methods for Cloud Applications
Disaster Recovery
Distributed Data Center Architectures and Services
Distributed Information Systems
Cloud Applications & Secure Environments
e-Business
e-Commerce
e-Governance
e-Government
e-Learning
e-Society
Green Cloud Networking
Incident Response Issues
Internet Architecture
Internet of Services
Internet of things
Internet Routing of Cloud data
Internet technologies
Intra-Cloud vs Inter-Cloud Management
IPSec Quality of Service
Load Balancing
MANET Security
Mobile Cloud Networking, Follow-Me-Cloud
Network on the fly, Virtual control, Virtual radio, Isolation
New Novel Mechanism and Application for Cloud Computing
Outsourced Production Environments
Peer to Peer Data Management
Performance Development and Management
Secure Communications
Security and Data Management
Security Challenges and Content Authoring
Security Stack
Security, Privacy, Confidentiality in Cloud networking
Semantic Web Technologies
Service and Systems Design and QoS Network Security
Service Composition
Service Discovery
Service Innovation
Service Marketing and Management
Service Modeling and Specification
Service Monitoring and Control
Service Strategy
Smart Homes and its Business Model
Storage Area Networks, Optical Interconnect, Fiber Channel
Technology-Enabled Information
Trust, Privacy and Data Security
Ubiquitous Systems
Virtual Ethernet Switching, Data Center Bridging
Virtualization of Wireless Equipment
Web Services
Wireless Sensor Network Security
Other CFPs
- International Conference on Computer Vision and Pattern Recognition ICCVPR’ 2014
- International Conference on Education & eLearning Innovations ICEELI’14
- the Global Social Sciences Conference 2014
- Hong Kong International Conference on Social Science 2014
- Global Summit on Computer & Information Technology
Last modified: 2014-04-06 14:35:56