[AISWorld] Unsubscribe: ALL

D Clanton amenllc at gmail.com
Mon Jun 25 19:25:26 EDT 2012


On Mon, Jun 25, 2012 at 4:44 AM, Chang Liu <changliu.aus at gmail.com> wrote:
> Submission Deadline Extended to 10 July, 2012.
>
> We apologize for any cross-postings.
>
> Call for papers: The 2012 International Symposium on Privacy and Security in
> Cloud and Social Networks (PriSecCSN 2012), 1-3 Nov. 2012, Xiangtan, China.
>
> The website is: http://www.swinflow.org/confs/prisec2012/.
>
> Important dates:
> Deadline for Paper Submission: Extended to July 10, 2012
> Notification of Acceptance: July 30, 2012
> Camera Ready Copies: August 10, 2012
>
> Submission site and requirements:
> https://www.easychair.org/conferences/?conf=prisec2012. Please submit your
> paper(s) in PDF file.
>
> Papers should be limited up to 8 pages in IEEE CS format. The template files
> for LATEX or WORD can be downloaded from the symposium website. All papers
> will be peer reviewed by two or three pc members. Submitting a paper to the
> symposium means that if the paper is accepted, at least one author should
> register to CGC2012 and attend the conference to present the paper.
>
> Publications:
> All accepted papers will appear in the proceedings published by IEEE
> Computer Society (EI indexed). Selected papers will be invited to special
> issues of CGC2012 in Concurrency and Computation: Practice and Experience,
> Future Generation Computer Systems and International Journal of High
> Performance Computing Applications.
>
> Introduction:
> Social network analysis and cloud computing are two of the most exciting new
> trends in the recent developments of information technology. As the new
> generation computing paradigm, cloud enables computing resources to be
> provided as IT services in a pay-as-you-go fashion with high efficiency and
> effectiveness. With the popularity of social software as well as the fast
> development of cloud and other high-performance computing infrastructures,
> the outcome of social network analysis is becoming more and more attractive.
> However, information privacy and security issues are major challenges in
> both these areas. This symposium aims at providing a forum for researchers,
> practitioners and developers from different background areas such as
> distributed computing, social computing, information security and privacy
> protection areas to exchange the latest experience, research ideas and
> synergic research and development on fundamental issues and applications
> about security and privacy issues in cloud environments and social networks.
> The symposium solicits high quality research results in all related areas.
>
> Topics:
> The objective of this symposium is to invite authors to submit original
> manuscripts that demonstrate and explore current advances in all aspects of
> security and privacy in cloud
> computing environments. The symposium solicits novel papers on a broad range
> of topics, including but not limited to:
>
> Security and privacy in Big Data management
> Application of modern cryptography in cloud and social networks
> Emerging threats in cloud-based services
> Multi-tenancy related security/privacy issues
> Secure virtualisation mechanisms
> Vulnerabilities in cloud infrastructure
> Vulnerabilities in MapReduce
> Security modelling and threats in cloud computing
> Security/privacy in hybrid cloud
> Auditing in cloud computing
> Access control in cloud computing
> Secure Job deployment and scheduling
> Secure resource allocation and indexing
> User authentication in cloud services
> Practical privacy and integrity mechanisms for data outsourcing
> Foundations of cloud-centric threat models
> Information hiding
> Trust and policy management in cloud
> Secure identity management mechanisms
> Security/privacy/trust issues in SaaS/PaaS/IaaS
> Business and security risk models
> Cost and usability models related security issues in clouds
> Security for emerging cloud programming models
> Remote data integrity protection
> Securing distributed data storage in the cloud
> Data-centric security and data classification
> Security and privacy in mobile cloud
> Intrusion detection/prevention
> Malware propagation in social networks
> Information leakage via social networks
> Social currency mechanisms - potential and risks
> Privacy management in social networks - access controls, permissions
> Identity theft in social networks
> Collaborative detection of distributed network attacks
> Peer-to-peer based security mechanisms
> Trust and reputation in social networks
> Socially inspired network security architectures
> Socially aware network security protocols
> Security configuration based on social contexts groups (social-firewall,
> authentication protocols, etc.)
> Configuring security protocol parameters based on social information
> Privacy-preserving methods for data access and data mining
> Domain Security
> Privacy Requirements Engineering
> Private Information Retrieval
> Privacy and Security in Personal Health Records
> Online Social Footprints
> Secure Multi-party Computation
> Privacy Mechanisms in Services
> Pseudonymity and Anonymity Modelling
> Software Security Engineering
> Integrity Verification
> Trust Development in Collaboration Teams
> Usable Privacy Design
> Privacy Aware Access Control Model
> Multi-Faceted Privacy Preservation
> Access Control and RBAC Policies
>
> General Chairs:
>
> Philip S. Yu, University of Illinois at Chicago, USA
> Bhavani Thuraisingham, The University of Texas at Dallas, USA
> Vijay Varadharajan, Macquarie University, Australia
>
> Program Chairs:
>
> Chang Liu, University of Technology, Sydney, Australia
> Rajiv Ranjan, CSIRO, Australia
> Jinjun Chen, University of Technology, Sydney, Australia
>
> Program Committee:
>
> Rose-Mharie ?hlfeldt, University of Sk?vde, Sweden
> Cristina Alcaraz, University of Malaga, Spain
> Basel Alomair, University of Washington, USA
> Alessandro Armando, Universita` di Genova, Italy
> Reza Azarderakhsh, University of Waterloo, Canada
> Shlomi Dolev, Ben-Gurion University, Israel
> Rino Falcone, National Research Council, Italy
> Debasis Giri, Haldia Institute of Technology, India
> Dieter Gollmann, TU Hamburg-Harburg, Germany
> Kartik Gopalan, SUNY – Binghamton, USA
> Victor Govindaswamy, Texas A&M University – Texarkana, USA
> Shuguo Han, Institute for Infocomm Research, Singapore
> Ching-Hsien Hsu, Chung Hua University, Taiwan
> Meiko Jensen, Ruhr University Bochum, Germany
> Henrik Johnsson, Blekinge Institute of Technology, Sweden
> Changhoon Lee, Hanshin University, Korea
> Sjouke Mauw, University of Luxembourg, Luxembourg
> Yves-Alexandre de Montjoye, MIT, USA
> Charles Morisset, IIT - CNR, Italy
> David Naccache, ENS, France
> Stefano Paraboschi, Universita` degli Studi di Bergamo,Italy
> Gerard Parr, University of Ulster, UK
> Siani Pearson, HP Labs, UK
> Guenther Pernul, University of Regensburg, Germany
> Radha Poovendran, University of Washington, USA
> Rami Puzis, Ben Gurion University, Israel
> Peter Ryan, University of Luxembourg, Luxembourg
> Jean-Marc Seigneur, University of Geneva, Switzerland
> Abhinav Srivastava, AT&T Research, USA
> Yevgeniy Vahlis, AT&T, USA
> Guilin Wang, University of Wollongong, Australia
> KE WANG, Simon Fraser University, Burnaby
> Yang Xiang, Deakin University, Australia
> John Zic, CSIRO, Australia
>
>
> Any inquiries, please direct to Chang Liu at changliu.it at gmail.com.
>
>
> _______________________________________________
> AISWorld mailing list
> AISWorld at lists.aisnet.org



-- 
AMEN LLC
http://amenllc.drinkactweb.com/
Sponsor: Darryn Clanton
Dealer  ID# 19244944
amenllc at gmail.com
510.502.2458 ph




More information about the AISWorld mailing list