CCSTIM 2017 - International Workshop on Cloud Computing Security: Threats, Intelligence, and Mitigation (CCSTIM)
Topics/Call fo Papers
The cloud computing paradigm enables the sharing of computing resources for users to enjoy readily available cloud applications and services without the consumption of local resources. The number of connected devices is continually increasing, and thus is the infrastructure on which they operate. The unique attributes of cloud systems results in the introduction of many security and privacy challenges, which are further exacerbated by new developments in infrastructure and software. This workshop is a forum to bring together researchers and practitioner to discuss the latest advancements in cloud security threats, the development of novel countermeasures, and the necessity to prevent cyber threats through security-by-design.
Topics include but not restricted to:
Identification and analysis of security threats facing cloud and fog systems
Security-by-design in connected systems
The identification of security vulnerabilities and the assessment of new threats
Vulnerabilities patch and legacy applications management
Secure data management and outsourcing
Data privacy and privacy enabling mechanisms
Virtualisation security and sandboxing
Trusted computing technologies
Secured data sharing and communication among hybrid clouds
Security and identify management mechanisms
Secure programming models and the 'secure-by-design' philosophy
Security scalability for cloud and fog systems
System availability, recovery and auditing in a security context
Novel Intrusion Detection Systems (IDS)
Incident response and breach prevention technologies
Use of Artificial Intelligence within cloud and fog security
Human factors of cloud and fog security
Data privacy and security, including cryptography
Topics include but not restricted to:
Identification and analysis of security threats facing cloud and fog systems
Security-by-design in connected systems
The identification of security vulnerabilities and the assessment of new threats
Vulnerabilities patch and legacy applications management
Secure data management and outsourcing
Data privacy and privacy enabling mechanisms
Virtualisation security and sandboxing
Trusted computing technologies
Secured data sharing and communication among hybrid clouds
Security and identify management mechanisms
Secure programming models and the 'secure-by-design' philosophy
Security scalability for cloud and fog systems
System availability, recovery and auditing in a security context
Novel Intrusion Detection Systems (IDS)
Incident response and breach prevention technologies
Use of Artificial Intelligence within cloud and fog security
Human factors of cloud and fog security
Data privacy and security, including cryptography
Other CFPs
- 6th International Workshop on Clouds and (eScience) Applications Management
- 1st International Industry/University Workshop on Data-center Automation, Analytics, and Control
- IWGDDC 2017 International Workshop on Game Development and Design in the Cloud
- 1st International Workshop on Heterogeneous Distributed Cloud Computing
- 3rd International Symposium on Real-time Data Processing for Cloud Computing (RTDPCC 2017 – II)
Last modified: 2017-08-19 13:30:37