[Om-announce] [IWSAC 2016] Deadline Approaching (September 24, 2016)
[Apologies if you receive multiple copies of this message] *** CALL FOR PAPERS *** FOURTH INTERNATIONAL WORKSHOP ON SECURITY ASSURANCE IN THE CLOUD (IWSAC 2016) Held in conjunction with the 12nd International Conference on Signal Image Technology & Internet Based Systems (SITIS 2016) One day between November 28 - December 1, 2016, Naples, Italy Web site: http://sesar.di.unimi.it/IWSAC2016 IWSAC 2016 BACKGROUND AND GOALS Cloud computing paradigm provides a new environment fostering the integration of services located within company boundaries with those in the Cloud. An increasing number of organizations implement their business processes and applications via runtime composition of services made available in the Cloud by external suppliers. This scenario is changing the traditional view of security introducing new service security risks and threats, and requires re-thinking of current assurance, development, testing, and verification methodologies. In particular, security assurance in the cloud is becoming a pressing need to increase the confidence of the cloud actors that the cloud and its services are behaving as expected, and requires novel approaches addressing cloud peculiarities. In addition, the increasing usage of cloud resources as a means to perform big data analytics introduces the need of adapting existing assurance solutions towards big data. On one side, security assurance techniques can benefit from the availability of big data (big data for security assurance), while on the other side they can be applied to verify properties of big data analytics (security assurance for big data). IWSAC 2016 is the fourth edition of the International Workshop on Security Assurance in the Cloud. It aims to address the security assurance issues related to Cloud and Big Data environments, along with evaluating their impact on traditional security solutions for software and network systems. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and assurance of Cloud and Big Data services, as well as experimental studies in Cloud and Big Data infrastructures, the implementation of services, and lessons learned. Topics of interest include, but are not limited to: * Accountability in the cloud * Authentication and access control in the cloud * Big Data for security assurance * Big Data analytics monitoring and testing * Big Data analytics verification * Big Data security and privacy * Challenges in moving critical systems to the cloud * Cloud audit, certification, and compliance * Cloud transparency, introspection, and outrospection * Data security and privacy in the Cloud * Evidence-based assurance of cloud services * Information assurance and trust management * Intrusion detection in the cloud * Policy compliance * Security assurance in the cloud * Security assurance for big data * Security and assurance protocols in the cloud * Security and privacy in the cloud * Service level agreements * Service procurement in the cloud * Verification of cloud services IMPORTANT DATES Submission deadline: September 24 *FIRM DEADLINE* (11:59 PM American Samoa time) Acceptance/Reject notification: October 17, 2016 Camera-ready: October 24, 2016 Author Registration: October 24, 2016 SUBMISSION INSTRUCTIONS Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 8 pages in total including bibliography and well-marked appendices, and must follow the IEEE double columns publication format available at - [Microsoft Word DOC] ftp://pubftp.computer.org/Press/Outgoing/proceedings/instructA4x2.doc - [LaTex Formatting Macros] ftp://pubftp.computer.org/Press/Outgoing/proceedings/IEEE_CS_LatexA4x2.zip Submissions are to be made to the submission web site https://www.easychair.org/conferences/?conf=sitis2016 by selecting track "Workshop on Security Assurance in the Cloud". Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. All submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of expression by at least three reviewers. The organizers will examine the reviews and make final paper selections. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper must register for the workshop. A single registration for the workshop or the conference allows attending both events. All the papers accepted for the workshop will be included in the conference proceedings. The proceedings will be published by IEEE Computer Society. Content will be submitted to the indexing companies for possible indexing. The proceedings will be available at
[Om-announce] IEEE CNS 2016 Call for Participation
*IEEE Conference on Communications and Network Security (IEEE CNS) 17-19 October 2016, Philadelphia, PA USA.* *Early registration ends on September 23, 2016.* IEEE Conference on Communications and Network Security (CNS) is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cyber security. IEEE CNS is also a spin-off of IEEE INFOCOM, the premier ComSoc conference on networking. The goal of CNS is to provide an outstanding forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security. *Two exciting keynotes and two technology-oriented panels:* *Keynotes:* *- Speaker 1: Dr. Don Towsley, Professor, University of Massachusetts Amherst* *Don Towsley holds a B.A. in Physics (1971) and a Ph.D. in Computer Science (1975) from University of Texas. He is currently a Distinguished Professor at the University of Massachusetts in the School of Computer Science. He has held visiting positions at numerous universities and research labs. His research interests include networks and performance evaluation. He is co-founder and Co-EiC of the new ACM Transactions on Modeling and Performance Evaluation of COmputing Systems (TOMPECS), and has served as Editor-in-Chief of IEEE/ACM Transactions on Networking and on numerous editorial boards. He has served as Program Co-chair of several conferences including INFOCOM 2009. He is a corresponding member of the Brazilian Academy of Sciences and has received several achievement awards including the 2007 IEEE Koji Kobayashi Award and the 2011 INFOCOM Achievement Award. He has received numerous paper awards including the 2012 ACM SIGMETRICS Test-of-Time Award and a 2008 SIGCOMM Test-of-Time Paper Award, and the 1998 IEEE Communications Society William Bennett Best Paper Award. Last, he has been elected Fellow of both the ACM and IEEE.* *- Speaker 2: Dr. Cliff Wang, Division Chief of Computing Sciences, US Army Research Office* *Dr. Cliff Wang graduated from North Carolina State University with a PhD in computer engineering in 1996. He has been carrying out research in the area of computer vision, medical imaging, high speed networks, and most recently information security. He has authored over 40 technical papers and 3 Internet standards RFCs. Dr. Wang also authored/edited for 13 books in the area of information security and hold 3 US patents on information security system development. Since 2003, Dr. Wang has been managing extramural research portfolio on information assurance at US Army Research Office. In 2007 he was selected as the director of the computing sciences division at ARO while in the same time managing his program in cyber security. For the past ten years, Dr. Wang managed over $100M research funding which led to significant technology breakthroughs. Dr. Wang also holds adjunct faculty position at both Department of Computer Science and Department of Electrical and Computer Engineering at North Carolina State University.* *Panels:* *Panel I: Securing Software Defined Networks: From Theory to Practice* Moderator: *Anita Nikolich** (National Science Foundation & Morgridge Institute for Research)* Panelists: Guofei Gu, Texas A University Deniz Gurkan, University of Houston Hongxin Hu, Clemson University Dijiang Huang, Arizona State University Kuang-Ching (KC) Wang, Clemson University *Panel II: Wireless Security in the Era of Spectrum Sharing* Moderator: *Wenjing Lou** (National Science Foundation & Virginia Tech)* Panelists: Alex Lackpour, Spectrum Systems Lab, Lockheed Martin C. Emre Koksal, Ohio State University Guevara Noubir, Northeastern University Yanchao Zhang, Arizona State University CNS 2016 includes 38 regular papers, 5 workshops, 2 full panels, and a set of posters. This year each technical session will host a mini-panel with paper authors at the end of the session, and each poster author will give a high-level presentation to highlight their work in the main conference. CNS will feature the following five exciting workshops: 1. The 3rd Workshop on Physical-Layer Methods for Wireless Security 2. The Second International Workshop on Cognitive Radio and Electromagnetic Spectrum Security (CRESS 2016) 3. The Network Forensics Workshop 4. The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016) 5. CPS-Sec-International Workshop on Cyber-Physical Systems Security Please refer to program details at: http://cns2016.ieee-cns.org/content/program-glance -- - Shui YU, PhD, Senior Lecturer School of Information Technology, Deakin University, 221 Burwood Highway, Burwood, VIC 3125, Australia.
[Om-announce] IEEE ICC17 Big Data Track CFP and Special Issues
We apology for possible cross posting, and thank you for distributing this CFP --- Big Data Track, Selected Areas in Communications Symposium, 2017 IEEE International Conference on Communications (ICC 2017) 21-25 May 2017, Paris, France http://www.ieee-icc.org Scope and Motivation: This Big Data Track covers all aspects on their ideas, results, theories, visions, and experiences in big data relevant sciences, technologies, and applications. This track welcomes relevant paper submissions from researchers in academia, industry, and government, such as students, engineers, practioners, scientists, and policy makers. This track welcomes not only original technical and scientific research results but also technical surveys in relevant topics. Main Topics of Interest: To ensure complete coverage of the advances in this field, the Big Data Networking Track solicits contributions in, but not limited to, the following topical areas: • Big data models, theories, algorithms, approaches, solutions • Machine learning, data mining, web mining, and graph mining • Data lifecycle • Big data practices and applications • Big data in, with, and for communications and networking • Big data retrieval, processing, analysis, and analytics • Big data integration and visualization • Big data standardization and regulation • Big data architecture, infrastructure and platforms • Big data maintenance, management, and operations • Big data classifications, benchmarks and metrics • Big data acquisition, integration, cleaning, and practices • Big data in and for research, sciences and technologies • Big sciences and technologies • Big business and industries • Big data storage and management • Privacy protection, trust in Big Data • Policy making and legal issues in Big Data • Security in Big Data • Data intensive sciences and technologies • Big data in, with, and for cloud computing and networking • Green issues for and by big data • Big data semantics, scientific and knowledge discovery and intelligence • Inquiries and programming languages for big data • Big data placement, scheduling, and optimization • File systems and databases for big data • Evaluations, simulations and debugging and tools relevant to big data • Big data for smart cities and smart homes • Big data with and for smart grids • Big data with Internet of Things/cyber-physical systems • Big data with relevant signal processing techniques • Big data for biological, biomedical, and health science and technologies • Big data for social networks • Big data for multimedia and image processing • Big data for astronomy • Big data performance analysis and large-scale deployment • Quality of experiences and quality of services of big data • Distributed and federated datasets • Mobility and big data • Relevant surveys Sponsoring Technical Committees: • IEEE Technical Subcommittee on Big Data (TSCBD) How to Submit a Paper: The IEEE ICC 2017 website provides full instructions on how to submit papers. The URL for this Big Data track is https://edas.info/newPaper.php?c=22643=81058 . Submission Deadline: October 14, 2016. Special Issues for this track. We are organizing a few Special Issues related to this track, high quality submissions will be invited to further extended for the Special Issues. Big Data Security and Privacy with Digital Communications and Networks (Elsevier, due in February 2017, http://www.journals.elsevier.com/digital-communications-and-networks/call-for-papers/big-data-security-and-privacy ). More Special Issues to be confirmed. Any enquiries should be submit to the track chair, Dr Shui Yu, Deakin University, Australia. Email: s...@deakin.edu.au -- - Shui YU, PhD, Senior Lecturer School of Information Technology, Deakin University, 221 Burwood Highway, Burwood, VIC 3125, Australia. Telephone:0061 3 9251 7744 http://www.deakin.edu.au/~syu ___ Om-announce mailing list Om-announce@openmath.org http://openmath.org/mailman/listinfo/om-announce