[PET] CFP Cloud Security Special Issue

Shui Yu shuiyucfp at gmail.com
Fri Jan 8 01:46:28 GMT 2016


Call for Papers

IEEE Cloud Computing
www.computer.org/cloudcomputing

Special Issue on Cloud Security

Submission deadline: 29 February 2016
Publication date: September/October 2016

Many critical applications - from medical, financial, and big data
applications to applications with real-time constraints - are being
migrated to cloud platforms. It’s been predicted that the bulk of
future IT infrastructure spending will be on cloud platforms and
applications, and nearly half of all large enterprises are planning
cloud deployments by the end of 2017.

However, cloud computing systems and services are also major targets
for cyberattackers. Because the cloud infrastructure is always, to a
certain degree, an open and shared resource, it’s subject to
malicious attacks from both insiders and outsiders. Side-channel
attacks, identity hijacking, and distribution of malicious code have
all been observed. Thus, centralized management of security in cloud
environments needs to be carefully analyzed and maintained.

These vulnerabilities point to the importance of protecting cloud
platforms, infrastructures, hosted applications, and information data,
and create demand for much higher-level cloud security management
than is available today. This calls for comprehensive vulnerability
analyses and massive theoretical and practical innovation in security
technologies. This special issue aims to address these needs. Areas of
interest for the special issue include, but are not limited to: 


- Access control mechanisms for clouds
- Cloud security management
- Colluding attacks over multiple clouds
- Distributed denial of service in clouds
- Information retrieval on encrypted data in clouds
- Information sharing and data protection in clouds
- Intrusion detection in clouds
- Privacy policy framework for clouds

- Secure applications distributed over clouds
- Secure big data in clouds
- Security architectures for mobile cloud computing
- Security in software-de ned networks.
- Security protocols for cloud computing
- Trust computing for meshed cloud services
- Virtualization of security in clouds

Special Issue Guest Editors:
- Peter Mueller, IBM Zurich Research Laboratory, Zurich, Switzerland
- Chin-Tser Huang, University of South Carolina, USA
- Shui Yu, Deakin University, Australia
- Zahir Tari, RMIT University, Australia
- Ying-Dar Lin, National Chiao Tung University, Hsinchu, Taiwan

Submission Information:
Submissions should be 4,000 to 6,000 words long and should follow the
magazine’s guidelines on style and presentation. All submissions will
be subjected to single-blind, anonymous review in accordance with
normal practice for scientific publications. For more information,
contact the guest editors at ccm5-2016 at computer.org.

Authors should not assume that the audience will have specialized
experience in a particular subfield. All accepted articles will be
edited according to the IEEE Computer Society style guide
(www.computer.org/web/publications/styleguide).
Submit your papers to Manuscript Central at
https://mc.manuscriptcentral.com/ccm-cs.

-- 

-----------------------------

Shui YU, PhD, Senior Lecturer

School of Information Technology, Deakin University,

221 Burwood Highway, Burwood, VIC 3125,  Australia.

Telephone:0061 3 9251 7744

http://www.deakin.edu.au/~syu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.links.org/pipermail/pet/attachments/20160108/3ee80166/attachment.html>


More information about the PET mailing list