[PET] Call For Participation: 2015 ACM Cloud Computing Security Workshop (CCSW)

Luca Ferretti luca.ferretti at unimore.it
Fri Aug 28 08:36:08 BST 2015

                             Call for Participation:
                2015 ACM Cloud Computing Security Workshop (CCSW)
                    October 16, 2015, Denver, Colorado, USA
                In conjunction with the 22nd ACM CCS Conference


The CCSW workshop brings together researchers and practitioners in all security
and privacy aspects of cloud-centric and outsourced computing, to act as a
fertile ground for creative debate and interaction in security-sensitive areas
of computing impacted by clouds.

The 2015 edition of the CSSW workshop will take place on October 16, 2015, after
the 22nd ACM CCS Conference, in Denver, Colorado, USA. The workshop will feature
three paper presentations sessions and three keynote speeches.

* Early bird registration: September 20, 2015

* Registration information at: http://www.sigsac.org/ccs/CCS2015/pro_reg.html

* Keynote speakers:
    - Mike Reiter, University of North-Carolina
    - Chenxi Wang, Ciphercloud
    - Bruce Grenfell, Concur/SAP

* Program (details and updates at http://ccsw.ics.uci.edu/15/program.html):
    - 8:45 - 8:55, Welcome
    - 8:55 - 9:55, Keynote: Mike Reiter (University of North-Carolina)
        + Side-Channels in Multi-Tenant Environments
    - 9:55 - 10:45, Session I: System Security
        + How Private is Your Private Cloud? - Security Analysis of Cloud
          Control Interfaces
            Dennis Felsch (Ruhr-University Bochum); Mario Heiderich
            (Ruhr-University Bochum); Frederic Schulz (Ruhr-University Bochum);
            Joerg Schwenk (Ruhr-University Bochum)
        + Return Of The Covert Channel, Data Center Style
            Ken Block (Northeastern University); Guevara Noubir (Northeastern
    - 11:10 - 12:10,   Keynote: Chenxi Wang (Ciphercloud)
        + Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge
    - 2:00 - 2:50,     Keynote: Bruce Grenfell (Concur/SAP)
        + Being Successful in the Cloud -- Special secret or just plain old
          logic the secret
    -  2:50 - 3:40,     Session II: Applied Cryptography
        + Performance Analysis of Linux RNG in Virtualized Environments
            Rashmi Kumari (University of Calgary); Mohsen Alimomeni (University
            of Calgary); Reihaneh Safavi Naini (University of Calgary)
        + Fast Order-Preserving Encryption from Uniform Distribution Sampling
            Yong Ho Hwang (Samsung); Sungwook Kim (Samsung); Jae Woo Seo
    - 4:00 - 4:50,     Session III: Applied Cryptography II
        + Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with
          Multiple Data Owners
            Frank Li (University of California Berkeley); Eui Chul Richard Shin
            (University of California Berkeley); Vern Paxson (UC Berkeley/ICSI)
        + ORAM based forward privacy preserving Dynamic Searchable Symmetric
          Encryption Schemes
            Panagiotis Rizomiliotis (University of the Aegean); Stefanos
            Gritzalis (University of the Aegean)

* Organizers:
    - Cristina Nita-Rotaru, Purdue University (PC Co-Chair)
    - Florian Kerschbaum, SAP (PC Co-Chair)
    - Gene Tsudik, University of California, Irvine (Steering Chair)
    - Indrajit Ray, Colorado State University (General Chair)

More information about the PET mailing list