<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
{mso-style-priority:99;
mso-style-link:"Testo normale Carattere";
margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
span.StileMessaggioDiPostaElettronica17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
span.TestonormaleCarattere
{mso-style-name:"Testo normale Carattere";
mso-style-priority:99;
mso-style-link:"Testo normale";
font-family:"Calibri","sans-serif";}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri","sans-serif";
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 2.0cm 2.0cm 2.0cm;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=IT link="#0563C1" vlink="#954F72"><div class=WordSection1><p class=MsoPlainText><span lang=EN-US>[Apologies if you receive multiple copies of this message]<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>***************<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>CALL FOR PAPERS<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>***************<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>SECOND INTERNATIONAL WORKSHOP ON SECURITY ASSURANCE IN THE CLOUD (IWSAC<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>2014)<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>Held in conjunction with the 10th International Conference on Signal Image Technology & Internet Based Systems (SITIS 2014) One day between November 23-27, 2014, Marrakech, Morocco Web site: </span><a href="http://sesar.di.unimi.it/IWSAC2014"><span lang=EN-US>http://sesar.di.unimi.it/IWSAC2014</span></a><span lang=EN-US><o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>IWSAC 2014 BACKGROUND AND GOALS<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>The ongoing merge between Service-Oriented Architectures (SOAs) and the Cloud computing paradigm provides a new environment fostering the integration of services located within company boundaries with those in the Cloud. An increasing number of organizations implement their business processes and applications via runtime composition of services made available in the Cloud by external suppliers. This scenario is changing the traditional view of security introducing new service security risks and threats, and requires re-thinking of current assurance, development, testing, and verification methodologies. In particular, security assurance in the cloud is becoming a pressing need to increase the confidence of the cloud actors that the cloud and its services are behaving as expected, and requires novel approaches addressing SOA and cloud peculiarities. IWSAC 2014 is the continuation of the International Workshop on Securing Services on the Cloud, held in September 2011, Milan, Italy. It aims to address the security assurance issues related to the deployment of services in the Cloud, along with evaluating their impact on traditional security solutions for software and network systems.<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and assurance of services implemented in the Cloud, as well as experimental studies in Cloud infrastructures, the implementation of services, and lessons learned. Topics of interest include, but are not limited to:<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Authentication and access control in the cloud<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Challenges in moving critical systems to the cloud<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Cloud accountability<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Cloud audit<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Cloud compliance<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Cloud certification<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Cloud transparency, introspection, and outrospection<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Cybersecurity in the cloud<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Data security and privacy in the Cloud<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Information assurance and trust management<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Intrusion detection in the Cloud<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Security assurance in the cloud<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Security and assurance protocols in the Cloud<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Service level agreements<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Service procurement in the cloud<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Service verification in critical cloud services<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Test-based and monitoring-based verification of cloud services<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>IMPORTANT DATES<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>Paper submission due: September 6, 2014 (11:59 PM American Samoa time) Notification to authors: October 1, 2014 Camera-ready due: October 15, 2014 Registration due: October 19, 2014<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>SUBMISSION INSTRUCTIONS<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>8 pages in total including bibliography and well-marked appendices, and must follow the IEEE double columns publication format available at<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>- [Microsoft Word DOC]<o:p></o:p></span></p><p class=MsoPlainText><a href="ftp://pubftp.computer.org/Press/Outgoing/proceedings/instructA4x2.doc"><span lang=EN-US>ftp://pubftp.computer.org/Press/Outgoing/proceedings/instructA4x2.doc</span></a><span lang=EN-US><o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>- [LaTex Formatting Macros]<o:p></o:p></span></p><p class=MsoPlainText><a href="ftp://pubftp.computer.org/Press/Outgoing/proceedings/IEEE_CS_LatexA4x2.zip"><span lang=EN-US>ftp://pubftp.computer.org/Press/Outgoing/proceedings/IEEE_CS_LatexA4x2.zip</span></a><span lang=EN-US><o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>A maximum of 2 extra pages can be purchased for the final version of the accepted papers.<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>Submissions are to be made to the submission web site<o:p></o:p></span></p><p class=MsoPlainText><a href="https://www.easychair.org/conferences/?conf=sitis2014"><span lang=EN-US>https://www.easychair.org/conferences/?conf=sitis2014</span></a><span lang=EN-US> by selecting track "Workshop on Security Assurance in the Cloud". Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper is required to register with the main conference and present the paper.<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>Accepted papers at the workshop will be published in the conference proceedings and in the IEEE digital library.<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>Extended version of selected accepted papers will be considered for publication in a journal special issue (TBC).<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>IWSAC 2014 COMMITTEES AND CHAIRS<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>General Chair (SITIS General Chair)<o:p></o:p></span></p><p class=MsoPlainText>* Ernesto Damiani, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText>Program Chairs<o:p></o:p></p><p class=MsoPlainText>* Marco Anisetti, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoPlainText>* Claudio A. Ardagna, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoPlainText><span lang=EN-US>* Rasool Asal, British Telecommunications, UK/UAE<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US><o:p> </o:p></span></p><p class=MsoPlainText>Publicity Chair<o:p></o:p></p><p class=MsoPlainText>* Valerio Bellandi, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoPlainText>* Fulvio Frati, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText>Web Chair<o:p></o:p></p><p class=MsoPlainText>* Fulvio Frati, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText><span lang=EN-US>Program Committee<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Rafael Accorsi, University of Freiburg, Germany<o:p></o:p></span></p><p class=MsoPlainText>* Valerio Bellandi, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoPlainText>* Michele Bezzi, SAP, France<o:p></o:p></p><p class=MsoPlainText>* Mauro Conti, University of Padua, Italy<o:p></o:p></p><p class=MsoPlainText>* Nora Cuppens-Boulahia, Telecom Bretagne, France<o:p></o:p></p><p class=MsoPlainText>* Ernesto Damiani, Universita' degli Studi di Milano, Italy<o:p></o:p></p><p class=MsoPlainText><span lang=EN-US>* Eduardo Fernandez, Florida Atlantic University, USA<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Atsuhiro Goto, Institute of Information Security, Japan<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Nils Gruschka, NEC Laboratories Europe, Germany<o:p></o:p></span></p><p class=MsoPlainText><span lang=EN-US>* Patrick Hung, University of Ontario Institute of Technology, Canada<o:p></o:p></span></p><p class=MsoPlainText><span lang=DE-AT>* Meiko Jensen, Southern Denmark University, Denmark<o:p></o:p></span></p><p class=MsoPlainText><span lang=DE-AT>* Florian Kerschbaum, SAP, Germany<o:p></o:p></span></p><p class=MsoPlainText><span lang=DE-AT>* Nicolas Larrieu, ENAC, France<o:p></o:p></span></p><p class=MsoPlainText><span lang=DE-AT>* Antonio Mana, Universidad de Malaga, Spain<o:p></o:p></span></p><p class=MsoPlainText><span lang=DE-AT>* Siani Pearson, HP Labs, UK<o:p></o:p></span></p><p class=MsoPlainText><span lang=DE-AT>* George Spanoudakis, City University of London, UK<o:p></o:p></span></p><p class=MsoPlainText><span lang=DE-AT><o:p> </o:p></span></p><p class=MsoPlainText><span lang=EN-US>This call for papers and additional information about the conference can be found at </span><a href="http://sesar.di.unimi.it/iwsac2014"><span lang=EN-US>http://sesar.di.unimi.it/iwsac2014</span></a><span lang=EN-US><o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p></div><HR><BR>
<TABLE cellpadding="10">
<TR><TD>
<A HREF="http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille">
<img alt="5xmilleUniMi" src="http://www.unimi.it/img/banner_190x85_5mille.jpg">
</A>
</TD>
<TD>
<I>
<FONT color="#FC7F01" face="Verdana,Arial,Helvetica,sans-serif" size="2">
Il 5 x mille</FONT> <FONT color="#535354" face="Verdana,Arial,Helvetica,sans-serif" size="2">alla nostra Università è un investimento sui giovani,<BR>
sui loro migliori progetti.
<P>
Sostiene la libera ricerca.<BR>
Alimenta le loro speranze nel futuro.
</P>
<P>
Investi il tuo <FONT color="#FC7F01" face="Verdana,Arial,Helvetica,sans-serif" size="2">
5 x mille</FONT> <FONT color="#535354" face="Verdana,Arial,Helvetica,sans-serif" size="2">sui giovani.
</FONT>
</P>
</I>
</TD>
</TR>
</TABLE>
</body></html>