征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Cloud computing is a major research area. Much of the discussion is due to the security issues it poses as a new technology and to the IT paradigm shift, as well as the fact that increasing cybersecurity concerns have a direct impact on the cloud. Issues span from fundamental confidentiality assurance of data in rest and motion, due to data outsourcing, to regulation and jurisdiction problems of legal data ownership and takeover. The virtualization technology that supports the building blocks for multi-tenant infrastructures also poses novel security risks and vulnerabilities that need to be properly addressed. Ironically, the interplay of these new technologies paves the way for the development of novel defenses against the very threats that arise in the current attack landscape. For example, virtual machine escape vulnerabilities are specific to virtualization technology, the same one that simplifies dynamic malware analysis.

Cloud computing research is a multidisciplinary effort involving cryptography, networking, software development, system architecture, among others. This workshop aims to attract innovative research works and foster discussions addressing technical, policy and legal issues of information security, assurance and reliability in cloud computing environments, elaborating on distinguished and emerging topics that are of interest to both the academia and the industry.

征稿信息

重要日期

2016-08-14
初稿截稿日期

征稿范围

The Technical Program Committee of WISARC 2016 invites researchers and practitioners to prepare high-quality submissions describing unpublished theoretical or practical research related with, but not limited to, the following topics:

* Architecture security of web services and web protocols;
* Assurance of data sanitization in the Cloud;
* Auditability of cloud systems;
* Big data and log analysis;
* Cloud and BYOD integration security;
* Cloud availability and resources starvation;
* Cloud computing cybercriminality, APTs and cybersecurity;
* Cloud-focused attacks;
* Cloud forensics;
* Cryptography for the Cloud;
* Cryptography in trust models and trusted computing technology;
* Cybercriminality, APTs and cybersecurity leveraging the Cloud;
* Enforcement of security in hybrid clouds;
* Interclouds security;
* Modern malware analysis;
* Multi-factor auth (authentication and authorization);
* Network perimeter security, monitoring and SIEM in the cloud for incident response;
* Network steganography;
* Privacy and anonymization in cloud systems;
* Reliable and privacy-preserving outsourced storage and distributed computing;
* Secure (federated) identity management and SSO architectures;
* Secure and reliable cloud programming models;
* Secure generation and management of cryptography secrets in VMs;
* Security issues in software-defined networks;
* Security of open-source cloud software;
* Trust and policy management in cloud systems;
* Virtualization and sandbox security and VM isolation assurance.

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    12月06日

    2016

    12月09日

    2016

  • 08月14日 2016

    初稿截稿日期

  • 12月09日 2016

    注册截止日期

主办单位
Ishik University
承办单位
Tongji University
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询