Cloud and Trusted Computing 2015 (C&TC 2015) International Symposium on Secure Virtual Infrastructures

Technical Program Chairs

Claudio Ardagna

University of Milano

Italy

Meiko Jensen

University of South Denmark

Denmark

CALL FOR PAPERS: Cloud and Trusted Computing 2015

Cloud and Trusted Computing 2015 is the fifth International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, organized as a component conference of the OnTheMove Federated Conferences & Workshops.
 
Current and future software needs remain focused towards the development and deployment of large and complex intelligent and networked information systems, required for the internet- and intranet-based systems in organizations, and cover a very wide range of application domains as well as technology and research issues. This has found realization through Cloud Computing. Vital element in such networked information systems are the notions of Trust, Security, Privacy and Risk.

 

This conference therefore is devoted to research in the topics of:
•    Cloud Computing
•    Trust, Security, Privacy and Risk


It also allows a special focus on the intersection of these two broad areas bringing together experts from the two communities to focus on the vital issue of trust, security, privacy and risk in Cloud Computing.
 

TOPICS OF INTEREST

For 2015, the following themes to be addressed by novel research have been identified:

Cloud Data Management:

•    Database as a Service, Multi-tenancy, Data management and analytics as a service
•    Elasticity and Scalability for Cloud Data Management Systems
•    Virtualization and Cloud databases, Storage Structures and Indexing
•    Big Data, Frameworks and Systems for Parallel and Distributed Computing
•    Data Science and Scalable Machine Learning
•    Resource and Workload Management in Cloud Databases
•    High Availability and Reliability
•    Transactional Models for Cloud Databases, Consistency and Replication
•    New Protocols, Interfaces and Data Models for Cloud Databases
•    Service Level Agreements
•    Interoperability between Clouds

Cloud Computing Infrastructures and Architectures:

•    Cloud Resource provisioning with QoS Guarantees
•    Virtualized Computing Infrastructures
•    Datacenter Architecture and Management
•    Cloud Operation and Resource Management
•    Cloud Performance Modeling and Benchmarks
•    Formal methods and Tools for Cloud computing
•    Infrastructures for Social Computing and Networking

Cloud Computing Applications:

•    Service Level Agreements and Performance Measurement
•    New Parallel / Concurrent Programming Models for Cloud Computing
•    Reliability, Fault Tolerance, Quality-of-Service
•    Service-Oriented Architectures, RESTful Services in Cloud Environments
•    Pervasive / Ubiquitous Computing in the Cloud
•    Large Scale Cloud Applications, Reality Mining
•    Clouds and Social Media, Network and Link Analysis
•    Cloud Business Applications and Case Studies
 
Trust, Security, Privacy and Risk


•    Autonomic Computing Theory, Models, Architectures and Communications
•    Cryptographic Algorithms and Protocols
•    Network Security
•    Identity and Trust Management
•    Trust Evaluation and Prediction in Service oriented Environments
•    Security Models and Quantifications
•    Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, etc.
•    Self-protection and Intrusion-detection in Security
•    DRM, Watermarking Technology, IP Protection
•    Context-aware Access Control
•    Virus Detections and Anti-virus Techniques/Software
•    Cyber Attack, Crime and Cyber War
•    Human Interaction with Trusted and Autonomic Computing Systems
•    Security, Dependability and Autonomic Issues in Ubiquitous Computing
•    Reliable Computing and Trusted Computing
•    Wireless Emergency and Security Systems
•    Multimedia Security Issues over Mobile and Wireless Networks
•    Software Architectures and Design for Trusted Emerging Systems
•    Risk evaluation and Management
•    Privacy
•    Cloud Computing with Autonomic and Trusted Environment

Security and Trust in Cloud Computing:

•    Algorithms and Computations on Encrypted Data
•    Cloud Trust, Security, Privacy and Confidentiality
•    Cloud Access Control and Authentication
•    Privilege Management Infrastructure
•    Networks of Trust, Clouds of Trust
•    Trusted Computing in virtualised environments
•    End-to-end security over complex cloud supply chain

MOTIVATION

Distributed computation is undergoing a radical paradigm shift, where users and developers alike are becoming fully decoupled from the technology infrastructure where their applications are executed. Computations details are abstracted by an increasingly deep virtualization layer, veiling distributed execution by means of the same "cloud" that supports it. Together, the notion of Cloud Computing and the related one of service-orientation are enabling new business models based on the seamless provision of dynamically scalable, virtualized resources as services made available “over the cloud”, to be accessed via a web browser.

For this vision to be realized, a number of problems need to be solved, involving the nuts-and-bolts of virtualization, scalability and distribution transparency of cloud-based computations, as well as attending to the fundamental issues of trust, security, and reliability of the solutions offered. Also the architectural abstractions driving their development (e.g. service composition versus on-line architectural transformations) need to be studied in depth. Clearly with the rapid evolution of these fields, the Cloud vision requires a huge research and development effort in the underlying theories and technologies, and we may expect advances here to significantly broaden the scope of the Cloud's applicability.

Cloud and Trusted Computing 2015 will investigate all issues related to the potential of the Cloud notion as a metaphor for the future Internet Services, providing semantically rich service descriptions and seamless interfaces to (virtual images of) locally held devices and other technologies such as the traditional Web, distributed datacenters and peer-to-peer systems.

IMPORTANT DATES


    Conference Abstract Submission Deadline: June 30, 2015 (strongly advised)
    Conference Paper Submission Deadline: July 06, 2015
    Acceptance Notification:  Aug 15, 2015
    Camera Ready Due:  Sept 01, 2015
    Author Registration Due:  Sept 01, 2015

SUBMISSION GUIDELINES


Full Papers
Regular paper submissions to Cloud and Trusted Computing 2015 (C&TC 2015) must present original, highly innovative, prospective and forward-looking research in one or more of the themes given above. Full papers must break new ground, present new insight, deliver a significant research contribution and provide validated support for its results and conclusions. Successful submissions typically represent a major advance for the field of cloud computing, referencing and relating the contribution to existing research work, giving a comprehensive, detailed and understandable explanation of a system, study, theory or methodology, and support the findings with a compelling evaluation and/or validation. Each paper must be submitted as a single PDF file in Springer Lecture Notes in Computer Science format (not longer than eighteen pages in length). Accepted regular papers will be included in the printed conference main proceedings and presented in the paper sessions. Submissions to C&TC 2014 must not be under review by any other conference or publication at any time during the C&TC review cycle, and must not be previously published or accepted for publication elsewhere.

Notes
Notes (not longer than six pages in length) must report new results and provide support for the results, as a novel and valuable contribution to the field – just like full papers. Notes are intended for succinct work that is nonetheless in a mature state ready for inclusion in archival proceedings. Notes will be held to the same standard of scientific quality as full papers, albeit for a shorter presentation, and must still state how they fit with respect to related work, and provide a compelling explanation and validation. Notes must be submitted as single PDF file in in Springer Lecture Notes in Computer Science format. Accepted notes will be published in the conference main proceedings and will be presented in the paper sessions of the conference.

5
2 ratings