征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Cloud computing has emerged as today's most exciting computing paradigm shift in information technology. With the efficient sharing of abundant computing resources in the cloud, users can economically enjoy the on-demand high quality cloud applications and services without committing large capital outlays locally. While the cloud benefits are compelling, its unique attributes also raise many security and privacy challenges in areas such as data security, recovery, privacy, access control, trusted computing, as well as legal issues in areas such as regulatory compliance, auditing, and many others. To implement secure and privacy-aware environments which can provide on-demand computing and high-quality service for cloud users is extremely urgent. This workshop is intended to bring together researchers, developers, and practitioners in security, privacy and mobile computing communities. We encourage submissions on all theoretical and practical aspects, as well as experimental studies of deployed systems. 

Authors are invited to submit either Research Papers or Position Papers or both. Position Papers that define new problems in cloud computing security or provide visions and clarifications of cloud computing security are solicited. Regular Research Papers that present novel research results on security and privacy in cloud computing are also welcome.

Program Co-Chairs

Cong Wang, City University of Hong Kong, China
Murat Kantarcioglu, University of Texas at Dallas, US

Steering Committee

Kui Ren, State University of New York at Buffalo, US 
Elaine Shi, Cornell University, US 
Robert Deng, Singapore Management University, Singapore 

Web Chair

Xingliang Yuan, City University of Hong Kong, China

征稿信息

重要日期

2017-01-31
初稿截稿日期
2017-02-15
初稿录用日期
2017-02-25
终稿截稿日期

征稿范围

Topics of interests include (but are not limited to) the following subject categories

  • Secure cloud architecture

  • Cloud cryptography

  • Cloud access control and key management

  • Identification and privacy in cloud

  • Integrity assurance for data outsourcing

  • Integrity and verifiable computation

  • Computation over encrypted data

  • Software and data segregation security

  • Secure management of virtualized resources

  • Trusted computing technology

  • Joint security and privacy aware protocol design

  • Failure detection and prediction

  • Secure data management within and across data centers

  • Availability, recovery and auditing

  • Secure computation outsourcing

  • Secure mobile cloud

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 04月02日

    2017

    会议日期

  • 01月31日 2017

    初稿截稿日期

  • 02月15日 2017

    初稿录用通知日期

  • 02月25日 2017

    终稿截稿日期

  • 04月02日 2017

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询