C&TC 2016 - 6th International Symposium on Secure Virtual Infrastructures - Cloud and Trusted Computing (C&TC 2016)
Topics/Call fo Papers
Current and future software needs to remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for internet-based and intranet-based systems in organizations. Today software covers a very wide range of application domains as well as technology and research issues. This has found realization through Cloud Computing, Big Data, and data intensive applications. Vital element in such networked information systems are the notions of trust, security, privacy and risk management.
Cloud and Trusted Computing (C&TC 2015) is the 6th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as a component conference of the OnTheMove Federated Conferences & Workshops. C&TC 2016 will be held in Rhodes, Greece.
The conference solicits submissions from both academia and industry presenting novel research in the context of Cloud Computing, Big Data, and data intensive applications, presenting theoretical and practical approaches to cloud and big data trust, security, privacy and risk management. The conference will provide a special focus on the intersection between cloud, big data, and trust bringing together experts from the three communities to discuss on the vital issues of trust, security, privacy and risk management in Cloud Computing, shedding the light on novel issues and requirements in big data domains. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. We also welcome review papers that analyze critically the current status of trust, security, privacy and risk management in the cloud. Papers from practitioners who encounter trust, security, privacy and risk management problems and seek understanding are also welcome.
TOPICS OF INTEREST
For 2016, a special emphasis will be put on “Secure and Trustworthy Cloud, Big Data, and Data-Intensive Applications”. The following themes to be addressed by novel research have been identified:
TRUST, SECURITY, PRIVACY AND RISK MANAGEMENT
Assurance Techniques
Access Control, Authorization, and Authentication
Big data security and privacy
Cloud Computing with Autonomic and Trusted Environment
Cryptographic Algorithms and Protocols
Cyber Attack, Crime and Cyber War
DRM, Watermarking Technology, IP Protection
Emergency and Security Systems
End-to-end security over complex cloud supply chain
Forensics
Human Interaction with Trusted and Autonomic Computing Systems
Identity and Trust Management
Multimedia Security Issues over Mobile and Wireless Clouds
Network Security
Networks of Trust, Clouds of Trust
Privacy, Anonymity
Privilege Management Infrastructure
Reliable Computing and Trusted Computing
Risk evaluation and Management
Security, Dependability and Autonomic Issues in Ubiquitous Computing
Security Models and Quantifications
Self-protection and Intrusion-detection in Security
Trust Evaluation and Prediction in Service-Oriented Environments
Trust, Security, Privacy and Confidentiality
Trust in big data analytics
Trusted Computing in virtualized environments
Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS
Virus Detections and Anti-virus Techniques/Software
DATA MANAGEMENT
Algorithms and Computations on Encrypted Data
Big Data, Frameworks and Systems for Parallel and Distributed Computing
Big Data Processing and Analytics
Big Data Preparation
Big Data Representation
Big Data Visualization- Database as a Service, Multi-tenancy, Data management and analytics as a service
Data Integrity
Data Science and Scalable Machine Learning
Elasticity and Scalability for Cloud Data Management Systems
High Availability and Reliability
Interoperability between Clouds- New Protocols, Interfaces and Data Models for Cloud Databases
Resource and Workload Management in Cloud Databases
Service Level Agreements and Contracts
Transactional Models for Cloud Databases, Consistency and Replication
Threats and countermeasures
Virtualization and Cloud databases, Storage Structures and Indexing
INFRASTRUCTURES AND ARCHITECTURES
Autonomic Computing Theory, Models, Architectures and Communications
Big Data Infrastructures
Cloud Resource provisioning with QoS Guarantees
Cloud Operation and Resource Management
Cloud Performance Modeling and Benchmarks
Datacenter Architecture and Management
Formal methods and Tools for Cloud computing
Infrastructures for Social Computing and Networking
NoSQL Databases
Software Architectures and Design for Trusted Emerging Systems
Virtualized Computing Infrastructures
APPLICATIONS
Big Data Applications and Case Studies
Cloud Business Applications and Case Studies
Clouds and Social Media, Network and Link Analysis
Data Intensive Applications
Large Scale Cloud Applications, Reality Mining
Mobile Cloud Services
New Parallel / Concurrent Programming Models for Cloud Computing
Pervasive / Ubiquitous Computing in the Cloud
Reliability, Fault Tolerance, Quality-of-Service
Service Level Agreements and Performance Measurement
Service-Oriented Architectures, RESTful Services in Cloud Environments
Cloud and Trusted Computing (C&TC 2015) is the 6th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as a component conference of the OnTheMove Federated Conferences & Workshops. C&TC 2016 will be held in Rhodes, Greece.
The conference solicits submissions from both academia and industry presenting novel research in the context of Cloud Computing, Big Data, and data intensive applications, presenting theoretical and practical approaches to cloud and big data trust, security, privacy and risk management. The conference will provide a special focus on the intersection between cloud, big data, and trust bringing together experts from the three communities to discuss on the vital issues of trust, security, privacy and risk management in Cloud Computing, shedding the light on novel issues and requirements in big data domains. Potential contributions could cover new approaches, methodologies, protocols, tools, or verification and validation techniques. We also welcome review papers that analyze critically the current status of trust, security, privacy and risk management in the cloud. Papers from practitioners who encounter trust, security, privacy and risk management problems and seek understanding are also welcome.
TOPICS OF INTEREST
For 2016, a special emphasis will be put on “Secure and Trustworthy Cloud, Big Data, and Data-Intensive Applications”. The following themes to be addressed by novel research have been identified:
TRUST, SECURITY, PRIVACY AND RISK MANAGEMENT
Assurance Techniques
Access Control, Authorization, and Authentication
Big data security and privacy
Cloud Computing with Autonomic and Trusted Environment
Cryptographic Algorithms and Protocols
Cyber Attack, Crime and Cyber War
DRM, Watermarking Technology, IP Protection
Emergency and Security Systems
End-to-end security over complex cloud supply chain
Forensics
Human Interaction with Trusted and Autonomic Computing Systems
Identity and Trust Management
Multimedia Security Issues over Mobile and Wireless Clouds
Network Security
Networks of Trust, Clouds of Trust
Privacy, Anonymity
Privilege Management Infrastructure
Reliable Computing and Trusted Computing
Risk evaluation and Management
Security, Dependability and Autonomic Issues in Ubiquitous Computing
Security Models and Quantifications
Self-protection and Intrusion-detection in Security
Trust Evaluation and Prediction in Service-Oriented Environments
Trust, Security, Privacy and Confidentiality
Trust in big data analytics
Trusted Computing in virtualized environments
Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS
Virus Detections and Anti-virus Techniques/Software
DATA MANAGEMENT
Algorithms and Computations on Encrypted Data
Big Data, Frameworks and Systems for Parallel and Distributed Computing
Big Data Processing and Analytics
Big Data Preparation
Big Data Representation
Big Data Visualization- Database as a Service, Multi-tenancy, Data management and analytics as a service
Data Integrity
Data Science and Scalable Machine Learning
Elasticity and Scalability for Cloud Data Management Systems
High Availability and Reliability
Interoperability between Clouds- New Protocols, Interfaces and Data Models for Cloud Databases
Resource and Workload Management in Cloud Databases
Service Level Agreements and Contracts
Transactional Models for Cloud Databases, Consistency and Replication
Threats and countermeasures
Virtualization and Cloud databases, Storage Structures and Indexing
INFRASTRUCTURES AND ARCHITECTURES
Autonomic Computing Theory, Models, Architectures and Communications
Big Data Infrastructures
Cloud Resource provisioning with QoS Guarantees
Cloud Operation and Resource Management
Cloud Performance Modeling and Benchmarks
Datacenter Architecture and Management
Formal methods and Tools for Cloud computing
Infrastructures for Social Computing and Networking
NoSQL Databases
Software Architectures and Design for Trusted Emerging Systems
Virtualized Computing Infrastructures
APPLICATIONS
Big Data Applications and Case Studies
Cloud Business Applications and Case Studies
Clouds and Social Media, Network and Link Analysis
Data Intensive Applications
Large Scale Cloud Applications, Reality Mining
Mobile Cloud Services
New Parallel / Concurrent Programming Models for Cloud Computing
Pervasive / Ubiquitous Computing in the Cloud
Reliability, Fault Tolerance, Quality-of-Service
Service Level Agreements and Performance Measurement
Service-Oriented Architectures, RESTful Services in Cloud Environments
Other CFPs
Last modified: 2016-03-06 22:55:04