Although mobile and cloud computing lie at two opposite edges of the internet, both are fundamental pieces of any wide scale distributed system, and used on a daily basis by millions of users to store personal and confidential information. This raises substantial challenges from the perspective of security and privacy. Mobile devices can be lost, stolen or compromised by malware; the connection from mobile devices to the cloud can be monitored and high-jacked by malicious hotspots; cloud providers have incentives to store and mine information about mobile users which may be leaked or sold. Furthermore, governments may force both cloud and mobile providers to provide access to sensible information or, even worse, to create backdoors on those infrastructures that may be exploited by malicious entities.
These threats require the development of coordinated mechanisms when connecting cloud and mobility in order to guarantee reliability and security of the services, and privacy of the data on all on all devices. The goal of the workshop is to bring together researchers and practitioners from security, mobile and cloud computing communities to present the state of the art, discuss emerging challenges and trends, and propose novel techniques, implementations and deployments of security, privacy, and reliability solutions for cloud and mobile services.
The workshop is looking for submissions in the form of papers with no more than 6 pages describing novel contributions and results, as well as experiments reports. The workshop welcomes contributions from both academia and industry, including papers that explore novel, in-progress ideas that are likely to foster discussion.
Access control and key management in clouds
Authentication in mobile devices and in clouds
Cloud-of-clouds security, privacy and dependability
Cryptography applications in mobile and in clouds
Hardware security mechanisms for mobile devices
Network security mechanisms in clouds and mobile devices
Privacy and identity management in clouds
Privacy in the mobile-cloud interaction
Secure computation in clouds
Security in critical areas: health, teleco, energy, etc.
Secure data management in clouds
Secure data management in mobile systems
Secure storage in clouds
User factors
Trusted execution environments in the cloud and mobile devices
Virtualization security
09月26日
2016
09月29日
2016
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言