<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.StileMessaggioDiPostaElettronica17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 2.0cm 2.0cm 2.0cm;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=IT link="#0563C1" vlink="#954F72"><div class=WordSection1><p class=MsoNormal><span lang=EN-US>[Apologies if you receive multiple copies of this CFP]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>*************************************************************************************************************<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>International WOrkshop on Cloud Security (IWOCS)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Hosted by the Third ASE International Conference on Cyber Security - Stanford, CA, USA, May 27 - May 31, 2014<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><a href="http://www.scienceengineering.org/ase/conference/2014/cybersecurity/sanjose/website/cloudsecurity-workshop/">http://www.scienceengineering.org/ase/conference/2014/cybersecurity/sanjose/website/cloudsecurity-workshop/</a> <o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>*************************************************************************************************************<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Description<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Cloud technology offers a powerful and fast growing approach to the provision of infrastructure, platform and software services without the high costs of owning, operating and maintaining the computational infrastructures required for this purpose. However, despite its appeal from the economic, operational and even energy consumption perspectives, cloud technology still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. These concerns arise from the difficulty to verify security properties of the different types of applications and services available through cloud technology and the uncertainty of the owners and users of such services about the security of their services, and of the applications based on them, once they are deployed and offered through a cloud. This difficulty stems from both the fact that the provision and security of a cloud service is sensitive to potential interference between the features and behaviour of all the inter-dependent services in all layers of the cloud stack, as well as dynamic changes in them; and the fact that current cloud models and infrastructure do not provide adequate support for controlling the behaviour of cloud software and for managing the decoupling of evolution cycles of the different software components, both applications and services, which happens in these scenarios. In this setting, system evolution, an inherent process in most computing systems, has an important impact on the security, resilience and quality of the cloud. In this line certification and other assurance approaches become crucial for establishing the necessary trust relationships. Likewise, novel testing mechanisms, engineering approaches, formal modelling paradigms, monitoring models, runtime support infrastructures, secure dynamic application building and service orchestration approaches, etc. are needed in order to fill other gaps and to restore the missing trust links in these new scenarios. The workshop will provide a forum for presenting research results, practical experiences, and innovative ideas in security infrastructures and applications for cloud computing. The workshop will focus on Cloud Computing security, how users of Cloud systems can be educated to maintain the security posture of their systems, and how to improve the state of the art of Cloud Computing. The workshop will also look at the need to facilitate research and development of the next generation of Cloud Computing security standards and tools to assist in the creation of better, more secure systems.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Important Dates<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>• Paper Submissions 15-03-2014<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Notification for Authors 01-04-2014<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Camera Ready Deadline 07-05-2014<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Workshop Dates 27-05-2014<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>===============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>List of Topics<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>===============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>• Secure Virtualization Structures<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Privacy Enforcement for cloud applications, platforms and operations<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Monitoring systems for cloud infrastructure/platform applications<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Cloud security architecture and protocol<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Data protection and secured information sharing in the cloud<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Evolution of multi-tenant monitoring as a function of the number of tenants.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Intra- and inter-cloud security issues and considerations<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Privacy policy framework for clouds<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Access control mechanisms and trust models for cloud services<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Energy/cost/efficiency of security in clouds<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Secure Mobile Cloud Networking<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Content and Service Distribution<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Security Certification for cloud<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• Security Engineering for cloud<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>=============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Organization<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>=============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Workshop chairs<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>• ANTONIO MUÑOZ, University of Málaga, Spain<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• ERNESTO DAMIANI, University of Milan, Italy<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Program Committee<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>• ALCARAZ-CALERO, JOSE M., Hewlett-Packard, UK<o:p></o:p></span></p><p class=MsoNormal>• ANTON DEL PINO, PABLO, U. of Málaga, Spain<o:p></o:p></p><p class=MsoNormal><span lang=EN-US>• BEZZI, MICHELE, SAP, France<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• BOYD, COLIN, Queensland U. of Tech., Australia<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• COLLBERG, CHRISTIAN, Arizona University, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• CUELLAR, JORGE, Siemens, Germany<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• DAVIDS, CAROL, Illinois Institute of Technology, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• DUSIT NIYATO, Nanyang Technological U., Singapore<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• ENDICOTT-POPOVSKY, BARBARA, U. of Washington, USA<o:p></o:p></span></p><p class=MsoNormal>• FERNANDEZ, EDUARDO B., Florida Atlantic U., USA<o:p></o:p></p><p class=MsoNormal>• GIORGINI, PAOLO, University of Trento, Italy<o:p></o:p></p><p class=MsoNormal><span lang=EN-US>• GRAWROCK, DAVID, Intel, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• GÜRGENS, SIGRID, Fraunhofer SIT, Germany<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• JÜRJENS, JAN, TU of Dortmund, Germany<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• KIYOMOTO, SHINSAKU, KDDI R&D Labs, Japan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• LAMBRINOUDAKIS, COSTAS, U. of Piraeus, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• LAURENCE T. YANG, St Francis Xavier University, Canada<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• LEVI, ALBERT, Sabanci University, Turkey<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• LOEVENICH, DANIEL, Bundesamt für Sicherheit in der Informationstechnik (BSI), Germany<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• LOSAVIO, MICHAEL, U. of Kentucky, USA<o:p></o:p></span></p><p class=MsoNormal>• LOTZ, VOLKMAR, SAP AG, France<o:p></o:p></p><p class=MsoNormal>• MAÑA, ANTONIO, University of Malaga, Spain<o:p></o:p></p><p class=MsoNormal>• MARTINELLI, FABIO, CNR-IIT, Italy<o:p></o:p></p><p class=MsoNormal>• MARTINEZ-PEREZ, GREGORIO, U. of Murcia, Spain<o:p></o:p></p><p class=MsoNormal><span lang=EN-US>• NADARAJAM, R., PSG College of Technology, India<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• POSEGGA, JOAQUM, U. of Passau, Germany<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>• PRESENZA, DOMENICO, Engineering, Italy<o:p></o:p></span></p><p class=MsoNormal><span lang=FR>• QUISQUATER, JEAN-JACQUES, U. Catholique De Louvain, Belgium<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• RAY, INDRAKSHI, Colorado State University, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• RUDOLPH, CARSTEN, Fraunhofer SIT, Germany<o:p></o:p></span></p><p class=MsoNormal>• SABETTA, ANTONINO, SAP, France<o:p></o:p></p><p class=MsoNormal>• SORIA-RODRIGUEZ, PEDRO, ATOS R&D, Spain<o:p></o:p></p><p class=MsoNormal><span lang=EN-US>• SKIANIS CHARALABOS, University of Aegean, Greece<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• SPANOUDAKIS, GEORGE, City University, UK<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• WASHIZAKI, HIRONORI, Waseda University, Japan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• WESPI, ANDREAS, IBM, Switzerland<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• YOSHIOKA, NOBUKAZU, Nat. I. of Informatics, Japan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>• ZULKERNINE, MOHAMMAD, Queen’s U., Canada<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>=============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Submissions<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>=============<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Authors are invited to submit Regular Papers (maximum 8 pages) or Short Papers (maximum 4 pages) using EasyChair. Regular papers will be evaluated according to normal research conference criteria with respect to relevance, originality, and quality of the methodology and writing. Work that is highly novel, controversial, or preliminary can be submitted as a short paper.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Proceedings of IWOCS 2014 will be included in the third ASE International Conference on Cyber Security, Stanford, CA, USA, May 27 – May 31, 2014.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Registration: Online Registration<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>====================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Implementation Plan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>====================<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>IWOCS will have a hybrid approach that will combine a traditional scientific workshop with an interactive forum for discussion of the main workshop topics, seeking the creation of a community and a clear focus on producing.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p></div></body></html>