ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

TSCloud 2015 - International Symposium on Trust and Security in Cloud Computing

Date2015-08-20 - 2015-08-22

Deadline2015-04-15

VenueHelsinki, Finland Finland

Keywords

Websitehttps://research.comnet.aalto.fi/Trustco...

Topics/Call fo Papers

The IEEE TSCloud 2015 Symposium brings together researchers with an interest in theoretical foundations and practical approaches to trust and security in cloud computing. The emphasis is on high-impact, novel/adopted theories and paradigms that address mathematical and logical underpinnings in trust and security in cloud computing, e.g. encryption, obfuscation, virtualisation security, governance, accountability, etc. Following the success of the first four TSCloud symposiums in Changsha, Liverpool, Melbourne and Beijing, this year’s TSCloud will focus on “New Challenges in Cloud Computing Security, Privacy and Trust”. As cloud computing matures and experiences increased adoption, the security of both data and infrastructures increases in importance. We invite researchers and practitioners to submit their novel ideas, interesting innovation or even surveys on important cloud security and trust topics
Scope and Interests
Topics of interest for both main and demo tracks include, but are not limited to:
Malware detection in cloud computing
Cryptography and encryption techniques for cloud computing
Data obfuscation for cloud computing
Accountability in cloud computing
Identity management in cloud computing
Account and Domain management in cloud computing
Security in virtualized environments
Governance, regulation and compliance in cloud computing
Data analytics for security in cloud computing
Visualization for security in cloud computing
Cloud computing threat detection techniques
Trust in cloud services
Trust reputation systems for cloud computing
Reports on critical, real-life security and trust use cases in cloud computing
Secure and trusted workflows in cloud computing
Techniques preventing the nefarious use of cloud computing
Cloud data leakage and data loss
Position papers on issues in security and trust in cloud computing

Last modified: 2015-01-20 23:31:59