ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CloudCrypto 2014 - International Workshop on Cloud Security and Cryptography (CloudCrypto’14)

Date2014-09-24 - 2014-09-27

Deadline2014-06-10

VenueDelhi, India India

Keywords

Website

Topics/Call fo Papers

International Workshop on Cloud Security and Cryptography (CloudCrypto’14)
http://icacci-conference.org/website/CloudCrypto20...
Cloud computing becomes the next generation architecture of IT Enterprise. Security has emerged as the most important obstacle to faster and more widespread adoption of cloud computing. International Workshop on Cloud Security and Cryptography (CloudCrypto’14) aims to bring together researchers and practitioners in all security aspects of cloud computing. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems.
Topics of interests include, but are not limited to the following:
Accountability for Cloud Computing
Availability, Recovery and Auditing
Cloud Access Control and Key Management
Cloud-Centric Threat Models
Coding and Cryptography for Secure Cloud
Parallel and Dynamic Searchable Symmetric Encryption
Attribute-Based Encryption
Multi-Party Computation with Low Communication
Homomorphic Encryption
Cryptographic Cloud Storage
Randomness Testing of Modern Encryption Techniques
Evolution of Cloud Security Measures
Failure Detection and Prediction
Cloud Forensics
Identity Management in the Cloud
Integrity and Verifiable Computation
Privacy Preserving Technologies in Cloud Computing
Proofs of Storage
Remote Attestation Mechanisms in Clouds
Scalability of Security in Global-Size Clouds
Secure Cloud Architecture
Secure Computation Outsourcing
Secure Data Management
Secure Management of Virtualized Resources
Secure Mobile Cloud
Security for Emerging Cloud Programming Models
Secured Searching in Cloud Data
Trust and Policy Management in Clouds
Continuous Security Monitoring
New Cloud-Aware Web Service Security Paradigms and Mechanisms
Business and Security Risk Models and Clouds
Case Studies and Experimental Implementations
Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at: http://icacci-conference.org/website/call-papers

Last modified: 2014-04-21 22:42:09