[governance] [C&TC2015] Extended Submission Deadline (July 16th, 2015)

Nick Ashton-Hart nashton at consensus.pro
Wed Jul 8 01:36:20 EDT 2015


Far too many copies of this on far too many lists and also much too frequently.

On 7 Jul 2015, at 16:50, Fulvio Frati <fulvio.frati at unimi.it> wrote:

> ***Submission deadline extended to July 16th, 2015***
> 
> [Apologies if you receive multiple copies of this message]
> 
> ==========================================================================
> CALL FOR PAPERS
> 5th International Symposium on Cloud Computing, Trusted Computing and
> Secure Virtual Infrastructures -- Cloud and Trusted Computing (C&TC 2015)
> October 26-28, 2015 -- Rhodes, Greece
> http://www.onthemove-conferences.org/index.php/cloud-trust-15
> ==========================================================================
> 
> ===========
> Description
> ===========
> 
> Current and future software needs to remain focused towards the development
> and deployment of large and complex intelligent and networked information
> systems, required for internet-based and intranet-based systems in
> organizations. Today software covers a very wide range of application
> domains as well as technology and research issues. This has found
> realization through Cloud Computing. Vital element in such networked
> information systems are the notions of trust, security, privacy and risk
> management.
> 
> Cloud and Trusted Computing (C&TC 2015) is the 5th International Symposium
> on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures,
> organized as a component conference of the OnTheMove Federated Conferences &
> Workshops. C&TC 2015 will be held in Rhodes, Greece.
> 
> The conference solicits submissions from both academia and industry
> presenting novel research in the context of Cloud Computing, presenting
> theoretical and practical approaches to cloud trust, security, privacy and
> risk management. The conference will provide a special focus on the
> intersection between cloud and trust bringing together experts from the two
> communities to discuss on the vital issues of trust, security, privacy and
> risk management in Cloud Computing. Potential contributions could cover new
> approaches, methodologies, protocols, tools, or verification and validation
> techniques. We also welcome review papers that analyze critically the
> current status of trust, security, privacy and risk management in the cloud.
> Papers from practitioners who encounter trust, security, privacy and risk
> management problems and seek understanding are also welcome.
> 
> Topics of interests of C&TC 2015 include, but are not limited to:
> 
> TRUST, SECURITY, PRIVACY AND RISK MANAGEMENT IN CLOUD COMPUTING
> - Assurance Techniques
> - Access Control, Authorization, and Authentication
> - Cloud Computing with Autonomic and Trusted Environment
> - Cryptographic Algorithms and Protocols
> - Cyber Attack, Crime and Cyber War
> - DRM, Watermarking Technology, IP Protection
> - Emergency and Security Systems
> - End-to-end security over complex cloud supply chain
> - Forensics
> - Human Interaction with Trusted and Autonomic Computing Systems
> - Identity and Trust Management
> - Multimedia Security Issues over Mobile and Wireless Clouds
> - Network Security
> - Networks of Trust, Clouds of Trust
> - Privacy, Anonymity
> - Privilege Management Infrastructure
> - Reliable Computing and Trusted Computing
> - Risk evaluation and Management
> - Security, Dependability and Autonomic Issues in Ubiquitous Computing
> - Security Models and Quantifications
> - Self-protection and Intrusion-detection in Security
> - Trust Evaluation and Prediction in Service-Oriented Environments
> - Trust, Security, Privacy and Confidentiality
> - Trusted Computing in virtualized environments
> - Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS
> - Virus Detections and Anti-virus Techniques/Software
> 
> CLOUD DATA MANAGEMENT
> - Algorithms and Computations on Encrypted Data
> - Big Data, Frameworks and Systems for Parallel and Distributed Computing
> - Database as a Service, Multi-tenancy, Data management and analytics as a
> service
> - Data Science and Scalable Machine Learning
> - Elasticity and Scalability for Cloud Data Management Systems
> - High Availability and Reliability
> - Interoperability between Clouds
> - New Protocols, Interfaces and Data Models for Cloud Databases
> - Resource and Workload Management in Cloud Databases
> - Service Level Agreements and Contracts
> - Transactional Models for Cloud Databases, Consistency and Replication
> - Virtualization and Cloud databases, Storage Structures and Indexing
> 
> CLOUD COMPUTING INFRASTRUCTURES AND ARCHITECTURES
> - Autonomic Computing Theory, Models, Architectures and Communications
> - Cloud Resource provisioning with QoS Guarantees
> - Cloud Operation and Resource Management
> - Cloud Performance Modeling and Benchmarks
> - Datacenter Architecture and Management
> - Formal methods and Tools for Cloud computing
> - Infrastructures for Social Computing and Networking
> - Software Architectures and Design for Trusted Emerging Systems
> - Virtualized Computing Infrastructures
> 
> CLOUD COMPUTING APPLICATIONS
> - Cloud Business Applications and Case Studies
> - Clouds and Social Media, Network and Link Analysis
> - Large Scale Cloud Applications, Reality Mining
> - Mobile Cloud Services
> - New Parallel / Concurrent Programming Models for Cloud Computing
> - Pervasive / Ubiquitous Computing in the Cloud
> - Reliability, Fault Tolerance, Quality-of-Service
> - Service Level Agreements and Performance Measurement
> - Service-Oriented Architectures, RESTful Services in Cloud Environments
> 
> ===============
> Important Dates
> ===============
> 
> - Paper Submission Deadline: July 16, 2015 (extended)
> - Acceptance Notification: August 23, 2015
> - Camera Ready Due: September 1, 2015
> - Author Registration Due: September 1, 2015
> 
> ================
> Paper Submission
> ================
> 
> FULL PAPERS
> Full paper submissions to Cloud and Trusted Computing 2015 (C&TC 2015) must
> present original, highly innovative, prospective and forward-looking
> research in one or more of the themes given above. Full papers must break
> new ground, present new insight, deliver a significant research contribution
> and provide validated support for its results and conclusions. Successful
> submissions typically represent a major advance for the field of cloud
> computing, referencing and relating the contribution to existing research
> work, giving a comprehensive, detailed and understandable explanation of a
> system, study, theory or methodology, and support the findings with a
> compelling evaluation and/or validation. Each paper must be submitted as a
> single PDF file in Springer Lecture Notes in Computer Science format (not
> longer than 18 pages in length). Accepted regular papers will be included in
> the printed conference main proceedings and presented in the paper sessions.
> Submissions to C&TC 2015 must not be under review by any other conference or
> publication at any time during the C&TC review cycle, and must not be
> previously published or accepted for publication elsewhere.
> 
> NOTES
> Notes (not longer than 6 pages in length) must report new results and
> provide support for the results, as a novel and valuable contribution to the
> field – just like full papers. Notes are intended for succinct work that is
> nonetheless in a mature state ready for inclusion in archival proceedings.
> Notes will be held to the same standard of scientific quality as full
> papers, albeit for a shorter presentation, and must still state how they fit
> with respect to related work, and provide a compelling explanation and
> validation. Notes must be submitted as single PDF file in Springer Lecture
> Notes in Computer Science format. Accepted notes will be published in the
> conference main proceedings and will be presented in the paper sessions of
> the conference.
> 
> A selection of the best papers from Cloud and Trusted Computing 2015 will be
> published in a special issue of The International Journal of Computer
> Systems Science and Engineering.
> 
> Submissions are to be made to the submission web site available at
> http://www.onthemove-conferences.org/index.php/submitpaper
> 
> PAPER FORMATTING AND PRESENTING
> The paper and notes submission site giving all the relevant submission
> details is located at:
> http://www.onthemove-conferences.org/index.php/authors-kit/camconfpapers.
> Failure to comply with the formatting instructions for submitted papers or
> notes will lead to the outright rejection of the paper without review.
> Failure to commit to presentation at the conference automatically excludes a
> paper from the proceedings.
> 
> ===============
> Program Chairs
> ===============
> 
> - Claudio Agostino Ardagna, Universita' degli studi di Milano, Italy
> - Meiko Jensen, Independent Centre for Privacy Protection
> Schleswig-Holstein, Germany
> 
> ==================
> Advisory Committee
> ==================
> 
> - Ernesto Damiani, Universita' degli studi di Milano, Italy
> - Salim Hariri, The University of Arizona, USA
> - Robert Meersman, Vrije Universiteit Brussel, Belgium
> - Siani Pearson, HP Labs, UK
> 
> =================
> Program Committee
> =================
> 
> - Marco Anisetti, Universita' degli Studi di Milano, Italy
> - Vijay Atluri, Rutgers University, USA
> - N. Balakrishnan, Indian Institute of Science, India
> - Endre Bangerter, Bern University of Applied Sciences, Switzerland
> - Michele Bezzi, SAP, France
> - Bud Brugger, Fraunhofer IAO, Germany
> - Marco Casassa Mont, HP Labs, UK
> - David Chadwick, University of Kent, UK
> - Henry Chan, The Hong Kong Polytechnic University
> - Alfredo Cuzzocrea, University of Calabria, Italy
> - Ernesto Damiani, Università degli Studi di Milano, Italy
> - Stefan Dessloch, University of Kaiserslautern, Germany
> - Francesco Di Cerbo, SAP Labs, France
> - Scharam Dustdar, Technical University of Vienna, Austria
> - Stefanos Gritzalis, University of the Aegean, Greece
> - Nils Gruschka, FH Kiel, Germany
> - Marit Hansen, Unabhangiges Landeszentrum fur Datenschutz
> Schleswig-Holstein, Kiel, Germany
> - Ching Hsien Hsu, Chung Hua University, Taiwan
> - Patrick Hung, University of Ontario, Canada
> - Martin Jaatun, SINTEF ICT, Norway
> - Florian Kerschbaum, SAP, Germany
> - Ryan Ko, University of Waikato, New Zealand
> - Zhiqiang Lin, UT Dallas, USA
> - Luigi Lo Iacono, Cologne University of Applied Sciences, Germany
> - Gregorio Martinez, University of Murcia, Spain
> - Hadi Otrok, Khalifa University, Abu Dhabi, UAE
> - Smriti R. Ramakrishnan, Oracle Corporation, USA
> - Damien Sauveron, Universite' de Limoges, France
> - Jorg Schwenk, Ruhr-Universität Bochum, Germany
> - Russell Sears, Pure Storage, USA
> - Bhavani Thuraisingham, UT Dallas, USA
> - Luca Vigano', King's College London, UK
> 
> ===============
> Publicity Chair
> ===============
> 
> - Fulvio Frati, Universita' degli Studi di Milano, Italy
> 
> More information available at
> http://www.onthemove-conferences.org/index.php/cloud-trust-15
> 
> 
> 
> 
> ****************
> Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi il codice fiscale 80012650158.
> 
> http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille
> 
> 
> ____________________________________________________________
> You received this message as a subscriber on the list:
>     governance at lists.igcaucus.org
> To be removed from the list, visit:
>     http://www.igcaucus.org/unsubscribing
> 
> For all other list information and functions, see:
>     http://lists.igcaucus.org/info/governance
> To edit your profile and to find the IGC's charter, see:
>     http://www.igcaucus.org/
> 
> Translate this email: http://translate.google.com/translate_t

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 670 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20150708/ccbe9bd0/attachment.sig>
-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
     governance at lists.igcaucus.org
To be removed from the list, visit:
     http://www.igcaucus.org/unsubscribing

For all other list information and functions, see:
     http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
     http://www.igcaucus.org/

Translate this email: http://translate.google.com/translate_t


More information about the Governance mailing list