CCSW 2010 - Workshop Cloud Computing Security(CCSW 2010)
Topics/Call fo Papers
Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The CCSW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:
secure cloud resource virtualization mechanisms
secure data management outsourcing (e.g., database as a service)
practical privacy and integrity mechanisms for outsourcing
foundations of cloud-centric threat models
secure computation outsourcing
remote attestation mechanisms in clouds
sandboxing and VM-based enforcements
trust and policy management in clouds
secure identity management mechanisms
new cloud-aware web service security paradigms and mechanisms
cloud-centric regulatory compliance issues and mechanisms
business and security risk models and clouds
cost and usability models and their interaction with security in clouds
scalability of security in global-size clouds
trusted computing technology and clouds
binary analysis of software for remote attestation and cloud protection
network security (DOS, IDS etc.) mechanisms for cloud contexts
security for emerging cloud programming models
energy/cost/efficiency of security in clouds
We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.
Student Stipends
Student stipends are available to attend CCSW. Please apply on the CCS website and mention CCSW as your target workshop. We plan on awarding 2-7 student travel grants (a function also of the quality of the applications).
Important Dates
Submissions due: June 28, 2010, 11:59pm EDT
Author notification: August 6, 2010
Camera-ready: August 16, 2010
Panel submissions due: August 30, 2010
Workshop: October 9, 2010
Submissions
CCSW is soliciting full papers of up to 12 pages and short papers of up to 6 pages. Submissions must be in double-column ACM format with a font no smaller than 9 point. Pages must be numbered. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library.
Both research and position/vision/white papers are invited. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All authors and their affiliations must be listed. Each accepted paper must be presented by one registered author. Please submit your paper here.
Proposals for panels are also solicited. The proposals are to be concise, up to 2 pages in length, describe the handled topics, name potential panelists and briefly scope the panel for CCSW. Disruptive and controversial panels are particularly encouraged. Please submit your panel proposals as a PDF by email to sion-AT-cs.stonybrook.edu or .
secure cloud resource virtualization mechanisms
secure data management outsourcing (e.g., database as a service)
practical privacy and integrity mechanisms for outsourcing
foundations of cloud-centric threat models
secure computation outsourcing
remote attestation mechanisms in clouds
sandboxing and VM-based enforcements
trust and policy management in clouds
secure identity management mechanisms
new cloud-aware web service security paradigms and mechanisms
cloud-centric regulatory compliance issues and mechanisms
business and security risk models and clouds
cost and usability models and their interaction with security in clouds
scalability of security in global-size clouds
trusted computing technology and clouds
binary analysis of software for remote attestation and cloud protection
network security (DOS, IDS etc.) mechanisms for cloud contexts
security for emerging cloud programming models
energy/cost/efficiency of security in clouds
We would like to especially encourage novel paradigms and controversial ideas that are not on the above list. The workshop is to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.
Student Stipends
Student stipends are available to attend CCSW. Please apply on the CCS website and mention CCSW as your target workshop. We plan on awarding 2-7 student travel grants (a function also of the quality of the applications).
Important Dates
Submissions due: June 28, 2010, 11:59pm EDT
Author notification: August 6, 2010
Camera-ready: August 16, 2010
Panel submissions due: August 30, 2010
Workshop: October 9, 2010
Submissions
CCSW is soliciting full papers of up to 12 pages and short papers of up to 6 pages. Submissions must be in double-column ACM format with a font no smaller than 9 point. Pages must be numbered. Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library.
Both research and position/vision/white papers are invited. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All authors and their affiliations must be listed. Each accepted paper must be presented by one registered author. Please submit your paper here.
Proposals for panels are also solicited. The proposals are to be concise, up to 2 pages in length, describe the handled topics, name potential panelists and briefly scope the panel for CCSW. Disruptive and controversial panels are particularly encouraged. Please submit your panel proposals as a PDF by email to sion-AT-cs.stonybrook.edu or .
Other CFPs
- Workshop on Scalable Trusted Computing (STC 2010)
- Workshop on Privacy in the Electronic Society (WPES 2010)
- The ACM Workshop on Digital Rights Management
- 2nd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig)
- International Workshop on Computational Intelligence for Multimedia Visual Information Processing (CIMVIP’2010)
Last modified: 2010-06-12 10:26:34