[145333] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Call for Papers: CPSRT 2010 - Deadlines Extended!

daemon@ATHENA.MIT.EDU (George Yee)
Tue Jul 13 06:53:12 2010

From: George Yee <gmyee@sce.carleton.ca>
Date: Tue, 13 Jul 2010 00:34:17 -0400
To: submissions@infosecnews.org,
 cryptography@metzdowd.com,
 reflective-middleware@cs.uiuc.edu,
 fttc@dependability.org,
 cipher-cfp@ieee-security.org


--Apple-Mail-3-40746654
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

DEADLINES EXTENDED!!

CALL FOR PAPERS (For HTML version, please visit =
http://CPSRT.cloudcom.org/)

INTERNATIONAL WORKSHOP ON CLOUD PRIVACY, SECURITY, RISK & TRUST (CPSRT =
2010)

In conjunction with 2nd IEEE International Conference on Cloud Computing =
Technology and Science (CloudCom 2010), November 30 - December 3, 2010 =
Indiana University, USA, http://2010.cloudcom.org/


IMPORTANT DATES - EXTENDED!

Submission deadline: 15 August 2010
Author notification: 15 September 2010
Camera-ready manuscript: 1 October 2010
Author registration: 1 October 2010
Workshop date: 30 November 2010


WORKSHOP  CHAIRS

Latifur Khan =96 University of Texas at Dallas, USA
email: lkhan@utdallas.edu

Siani Pearson =96 Hewlett-Packard Laboratories, Bristol, UK
e-mail: Siani.Pearson@hp.com

George Yee =96 Carleton University, Canada
e-mail: gmyee@sce.carleton.ca


WORKSHOP STEERING COMMITTEE (in progress)

Martin Gilje Jaatun, Department of Software Engineering, Safety and =
Security, SINTEF, Trondheim, Norway=20
Chunming Rong, Center of IP-based Services Innovation (CIPSI), =
University of Stavanger, Stavanger, Norway
Bhavani Thuraisingham, Cyber Security Research Center, University of =
Texas at Dallas, U.S.A.


WORKSHOP PROGRAM COMMITTEE

Carlisle Adams, University of Ottawa, Canada
Andrew Charleswoth, University of Bristol, UK=20
Giles Hogben, ENISA, Greece
Paul Hopkins, University of Warwick, UK
Latifur Khan, University of Texas at Dallas, USA
Steve Marsh, Communications Research Centre Canada, Canada
Christopher Millard, University of London, UK
Andrew Patrick, Office of the Privacy Commissioner of Canada, Canada
Siani Pearson, HP Labs, UK
Simon Shiu, HP Labs, UK
Sharad Singhal, HP Labs, USA
Ronggong Song, National Research Council Canada, Canada
Anthony Sulistio, Hochschule Furtwangen University, Germany
George Yee, Carleton University, Canada


WORKSHOP OBJECTIVE

Cloud computing has emerged to address an explosive growth of =
web-connected devices, and handle massive amounts of data. It is defined =
and characterized by massive scalability and new Internet-driven =
economics. Yet, privacy, security, and trust for cloud computing =
applications are lacking in many instances and risks need to be better =
understood.=20
   Privacy in cloud computing may appear straightforward, since one may =
conclude that as long as personal information is protected, it shouldn=92t=
 matter whether the processing is in a cloud or not. However, there may =
be hidden obstacles such as conflicting privacy laws between the =
location of processing and the location of data origin. Cloud computing =
can exacerbate the problem of reconciling these locations if needed, =
since the geographic location of processing can be extremely difficult =
to find out, due to cloud computing=92s dynamic nature. Another issue is =
user-centric control, which can be a legal requirement and also =
something consumers want. However, in cloud computing, the consumers' =
data is processed in the cloud, on machines they don't own or control, =
and there is a threat of theft, misuse or unauthorized resale. Thus, it =
may even be necessary in some cases to provide adequate trust for =
consumers to switch to cloud services.=20
   In the case of security, some cloud computing applications simply =
lack adequate security protection such as fine-grained access control =
and user authentication (e.g. Hadoop). Since enterprises are attracted =
to cloud computing due to potential savings in IT outlay and management, =
it is necessary to understand the business risks involved. If cloud =
computing is to be successful, it is essential that it is trusted by its =
users. Therefore, we also need studies on cloud-related trust topics, =
such as what are the components of such trust and how can trust be =
achieved, for security as well as for privacy.


MISSION

This year, the CPSRT workshop will bring together a diverse group of =
academics and industry practitioners in an integrated state-of-the-art =
analysis of privacy, security, risk, and trust in the cloud. The =
workshop will address cloud issues specifically related to access =
control, trust, policy management, secure distributed storage and =
privacy-aware map-reduce frameworks.=20


TOPICS OF INTEREST

The workshop includes but is not limited to the following topics that =
refer to computing in the cloud:
* Access control and key management
* Security and privacy policy management=20
* Identity management
* Remote data integrity protection
* Secure computation outsourcing
* Secure data management within and across data centers
* Secure distributed data storage
* Secure resource allocation and indexing
* Intrusion detection/prevention
* Denial-of-Service (DoS) attacks and defense
* Web service security, privacy, and trust
* User requirements for privacy
* Legal requirements for privacy=20
* Privacy enhancing technologies=20
* Privacy aware map-reduce framework=20
* Risk or threat identification and analysis
* Risk or threat management
* Trust enhancing technologies
* Trust management

These topics give rise to a number of interesting research questions to =
be discussed at the workshop, such as the following:
* How can consumers retain control over their data when it is stored and =
processed in the cloud?=20
* How can users' trust in cloud computing be enhanced? How can =
reputation management be used in a practical way?
* How can transborder data flow regulations be enforced within the =
cloud?=20
* How can solutions be tailored to a specific context? For example, how =
can privacy and security requirements be gathered and matched to service =
provisioning in an automated or semi-automated way, and on an ongoing =
basis?
* How can adequate assurance be given about the way in which cloud =
providers process and protect data?
* How can audit mechanisms be provided for the cloud?

Software demonstrations are welcome. We encourage submissions of =
=91greenhouse=92 work, which present early stages of cutting-edge =
research and development.=20


SUBMISSION

The submission format must conform to the following: 10 pages maximum =
including figures, tables and references (see =
http://CPSRT.cloudcom.org/). Authors should submit the manuscript in PDF =
format. The official language of the meeting is English. Please submit =
your paper to the CPSRT 2010 Workshop submission server =
(https://www.easychair.org/account/signin.cgi?conf=3Dcpsrt2010) via an =
EasyChair account.


DISSEMINATION

Peer-reviewed papers that are accepted for presentation at the workshop =
will be published in the CloudCom 2010 IEEE proceedings, and will be =
available in IEEExplore (EI indexing). The workshop organisers plan to =
invite the authors of selected high quality papers to revise and =
lengthen their papers for a special issue of a related journal or an =
edited book.=20

For further details, please visit the workshop Web site: =
http://CPSRT.cloudcom.org/







--Apple-Mail-3-40746654
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
medium; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; ">DEADLINES EXTENDED!!<br><br>CALL FOR PAPERS (For =
HTML version, please visit&nbsp;<a =
href=3D"http://CPSRT.cloudcom.org/">http://CPSRT.cloudcom.org/</a>)<br><br=
>INTERNATIONAL WORKSHOP ON CLOUD PRIVACY, SECURITY, RISK &amp; TRUST =
(CPSRT 2010)<br><br>In conjunction with 2nd IEEE International =
Conference on Cloud Computing Technology and Science (CloudCom 2010), =
November 30 - December 3, 2010 Indiana University, USA,&nbsp;<a =
href=3D"http://2010.cloudcom.org/">http://2010.cloudcom.org/</a><br><br><b=
r>IMPORTANT DATES - EXTENDED!<br><br>Submission deadline: 15 August =
2010<br>Author notification: 15 September 2010<br>Camera-ready =
manuscript: 1 October 2010<br>Author registration: 1 October =
2010<br>Workshop date: 30 November 2010<br><br><br>WORKSHOP =
&nbsp;CHAIRS<br><br>Latifur Khan =96 University of Texas at Dallas, =
USA<br>email:&nbsp;<a =
href=3D"mailto:lkhan@utdallas.edu">lkhan@utdallas.edu</a><br><br>Siani =
Pearson =96 Hewlett-Packard Laboratories, Bristol, UK<br>e-mail:&nbsp;<a =
href=3D"mailto:Siani.Pearson@hp.com">Siani.Pearson@hp.com</a><br><br>Georg=
e Yee =96 Carleton University, Canada<br>e-mail:&nbsp;<a =
href=3D"mailto:gmyee@sce.carleton.ca">gmyee@sce.carleton.ca</a><br><br><br=
>WORKSHOP STEERING COMMITTEE (in progress)<br><br>Martin Gilje Jaatun, =
Department of Software Engineering, Safety and Security, SINTEF, =
Trondheim, Norway&nbsp;<br>Chunming Rong, Center of IP-based Services =
Innovation (CIPSI), University of Stavanger, Stavanger, =
Norway<br>Bhavani Thuraisingham, Cyber Security Research Center, =
University of Texas at Dallas, U.S.A.<br><br><br>WORKSHOP PROGRAM =
COMMITTEE<br><br>Carlisle Adams, University of Ottawa, Canada<br>Andrew =
Charleswoth, University of Bristol, UK&nbsp;<br>Giles Hogben, ENISA, =
Greece<br>Paul Hopkins, University of Warwick, UK<br>Latifur Khan, =
University of Texas at Dallas, USA<br>Steve Marsh, Communications =
Research Centre Canada, Canada<br>Christopher Millard, University of =
London, UK<br>Andrew Patrick, Office of the Privacy Commissioner of =
Canada, Canada<br>Siani Pearson, HP Labs, UK<br>Simon Shiu, HP Labs, =
UK<br>Sharad Singhal, HP Labs, USA<br>Ronggong Song, National Research =
Council Canada, Canada<br>Anthony Sulistio, Hochschule Furtwangen =
University, Germany<br>George Yee, Carleton University, =
Canada<br><br><br>WORKSHOP OBJECTIVE<br><br>Cloud computing has emerged =
to address an explosive growth of web-connected devices, and handle =
massive amounts of data. It is defined and characterized by massive =
scalability and new Internet-driven economics. Yet, privacy, security, =
and trust for cloud computing applications are lacking in many instances =
and risks need to be better =
understood.&nbsp;<br>&nbsp;&nbsp;&nbsp;Privacy in cloud computing may =
appear straightforward, since one may conclude that as long as personal =
information is protected, it shouldn=92t matter whether the processing =
is in a cloud or not. However, there may be hidden obstacles such as =
conflicting privacy laws between the location of processing and the =
location of data origin. Cloud computing can exacerbate the problem of =
reconciling these locations if needed, since the geographic location of =
processing can be extremely difficult to find out, due to cloud =
computing=92s dynamic nature. Another issue is user-centric control, =
which can be a legal requirement and also something consumers want. =
However, in cloud computing, the consumers' data is processed in the =
cloud, on machines they don't own or control, and there is a threat of =
theft, misuse or unauthorized resale. Thus, it may even be necessary in =
some cases to provide adequate trust for consumers to switch to cloud =
services.&nbsp;<br>&nbsp;&nbsp;&nbsp;In the case of security, some cloud =
computing applications simply lack adequate security protection such as =
fine-grained access control and user authentication (e.g. Hadoop). Since =
enterprises are attracted to cloud computing due to potential savings in =
IT outlay and management, it is necessary to understand the business =
risks involved. If cloud computing is to be successful, it is essential =
that it is trusted by its users. Therefore, we also need studies on =
cloud-related trust topics, such as what are the components of such =
trust and how can trust be achieved, for security as well as for =
privacy.<br><br><br>MISSION<br><br>This year, the CPSRT workshop will =
bring together a diverse group of academics and industry practitioners =
in an integrated state-of-the-art analysis of privacy, security, risk, =
and trust in the cloud. The workshop will address cloud issues =
specifically related to access control, trust, policy management, secure =
distributed storage and privacy-aware map-reduce =
frameworks.&nbsp;<br><br><br>TOPICS OF INTEREST<br><br>The workshop =
includes but is not limited to the following topics that refer to =
computing in the cloud:<br>* Access control and key management<br>* =
Security and privacy policy management&nbsp;<br>* Identity =
management<br>* Remote data integrity protection<br>* Secure computation =
outsourcing<br>* Secure data management within and across data =
centers<br>* Secure distributed data storage<br>* Secure resource =
allocation and indexing<br>* Intrusion detection/prevention<br>* =
Denial-of-Service (DoS) attacks and defense<br>* Web service security, =
privacy, and trust<br>* User requirements for privacy<br>* Legal =
requirements for privacy&nbsp;<br>* Privacy enhancing =
technologies&nbsp;<br>* Privacy aware map-reduce framework&nbsp;<br>* =
Risk or threat identification and analysis<br>* Risk or threat =
management<br>* Trust enhancing technologies<br>* Trust =
management<br><br>These topics give rise to a number of interesting =
research questions to be discussed at the workshop, such as the =
following:<br>* How can consumers retain control over their data when it =
is stored and processed in the cloud?&nbsp;<br>* How can users' trust in =
cloud computing be enhanced? How can reputation management be used in a =
practical way?<br>* How can transborder data flow regulations be =
enforced within the cloud?&nbsp;<br>* How can solutions be tailored to a =
specific context? For example, how can privacy and security requirements =
be gathered and matched to service provisioning in an automated or =
semi-automated way, and on an ongoing basis?<br>* How can adequate =
assurance be given about the way in which cloud providers process and =
protect data?<br>* How can audit mechanisms be provided for the =
cloud?<br><br>Software demonstrations are welcome. We encourage =
submissions of =91greenhouse=92 work, which present early stages of =
cutting-edge research and =
development.&nbsp;<br><br><br>SUBMISSION<br><br>The submission format =
must conform to the following: 10 pages maximum including figures, =
tables and references (see&nbsp;<a =
href=3D"http://CPSRT.cloudcom.org/">http://CPSRT.cloudcom.org/</a>). =
Authors should submit the manuscript in PDF format. The official =
language of the meeting is English. Please submit your paper to the =
CPSRT 2010 Workshop submission server (<a =
href=3D"https://www.easychair.org/account/signin.cgi?conf=3Dcpsrt2010">htt=
ps://www.easychair.org/account/signin.cgi?conf=3Dcpsrt2010</a>) via an =
EasyChair account.<br><br><br>DISSEMINATION<br><br>Peer-reviewed papers =
that are accepted for presentation at the workshop will be published in =
the CloudCom 2010 IEEE proceedings, and will be available in IEEExplore =
(EI indexing). The workshop organisers plan to invite the authors of =
selected high quality papers to revise and lengthen their papers for a =
special issue of a related journal or an edited book.&nbsp;<br><br>For =
further details, please visit the workshop Web site:&nbsp;<a =
href=3D"http://CPSRT.cloudcom.org/">http://CPSRT.cloudcom.org/</a><br><br>=
</div></span><br class=3D"Apple-interchange-newline"></div></span><br =
class=3D"Apple-interchange-newline"></div></span><br =
class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br></body></html>=

--Apple-Mail-3-40746654--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post