[governance] [C&TC2015] Deadline for Abstract Submission Approaching (June 30, 2015)

Fulvio Frati fulvio.frati at unimi.it
Mon Jun 22 09:26:56 EDT 2015

[Apologies if you receive multiple copies of this message]

5th International Symposium on Cloud Computing, Trusted Computing and
Secure Virtual Infrastructures -- Cloud and Trusted Computing (C&TC 2015)
October 26-28, 2015 -- Rhodes, Greece


Current and future software needs to remain focused towards the development
and deployment of large and complex intelligent and networked information
systems, required for internet-based and intranet-based systems in
organizations. Today software covers a very wide range of application
domains as well as technology and research issues. This has found
realization through Cloud Computing. Vital element in such networked
information systems are the notions of trust, security, privacy and risk

Cloud and Trusted Computing (C&TC 2015) is the 5th International Symposium
on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures,
organized as a component conference of the OnTheMove Federated Conferences &
Workshops. C&TC 2015 will be held in Rhodes, Greece.

The conference solicits submissions from both academia and industry
presenting novel research in the context of Cloud Computing, presenting
theoretical and practical approaches to cloud trust, security, privacy and
risk management. The conference will provide a special focus on the
intersection between cloud and trust bringing together experts from the two
communities to discuss on the vital issues of trust, security, privacy and
risk management in Cloud Computing. Potential contributions could cover new
approaches, methodologies, protocols, tools, or verification and validation
techniques. We also welcome review papers that analyze critically the
current status of trust, security, privacy and risk management in the cloud.
Papers from practitioners who encounter trust, security, privacy and risk
management problems and seek understanding are also welcome.

Topics of interests of C&TC 2015 include, but are not limited to:

- Assurance Techniques
- Access Control, Authorization, and Authentication
- Cloud Computing with Autonomic and Trusted Environment
- Cryptographic Algorithms and Protocols
- Cyber Attack, Crime and Cyber War
- DRM, Watermarking Technology, IP Protection
- Emergency and Security Systems
- End-to-end security over complex cloud supply chain
- Forensics
- Human Interaction with Trusted and Autonomic Computing Systems
- Identity and Trust Management
- Multimedia Security Issues over Mobile and Wireless Clouds
- Network Security
- Networks of Trust, Clouds of Trust
- Privacy, Anonymity
- Privilege Management Infrastructure
- Reliable Computing and Trusted Computing
- Risk evaluation and Management
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- Security Models and Quantifications
- Self-protection and Intrusion-detection in Security
- Trust Evaluation and Prediction in Service-Oriented Environments
- Trust, Security, Privacy and Confidentiality
- Trusted Computing in virtualized environments
- Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS
- Virus Detections and Anti-virus Techniques/Software

- Algorithms and Computations on Encrypted Data
- Big Data, Frameworks and Systems for Parallel and Distributed Computing
- Database as a Service, Multi-tenancy, Data management and analytics as a
- Data Science and Scalable Machine Learning
- Elasticity and Scalability for Cloud Data Management Systems
- High Availability and Reliability
- Interoperability between Clouds
- New Protocols, Interfaces and Data Models for Cloud Databases
- Resource and Workload Management in Cloud Databases
- Service Level Agreements and Contracts
- Transactional Models for Cloud Databases, Consistency and Replication
- Virtualization and Cloud databases, Storage Structures and Indexing

- Autonomic Computing Theory, Models, Architectures and Communications
- Cloud Resource provisioning with QoS Guarantees
- Cloud Operation and Resource Management
- Cloud Performance Modeling and Benchmarks
- Datacenter Architecture and Management
- Formal methods and Tools for Cloud computing
- Infrastructures for Social Computing and Networking
- Software Architectures and Design for Trusted Emerging Systems
- Virtualized Computing Infrastructures

- Cloud Business Applications and Case Studies
- Clouds and Social Media, Network and Link Analysis
- Large Scale Cloud Applications, Reality Mining
- Mobile Cloud Services
- New Parallel / Concurrent Programming Models for Cloud Computing
- Pervasive / Ubiquitous Computing in the Cloud
- Reliability, Fault Tolerance, Quality-of-Service
- Service Level Agreements and Performance Measurement
- Service-Oriented Architectures, RESTful Services in Cloud Environments

Important Dates

- Abstract Submission Deadline: June 30, 2015
- Paper Submission Deadline: July 6, 2015
- Acceptance Notification: August 15, 2015
- Camera Ready Due: September 1, 2015
- Author Registration Due: September 1, 2015

Paper Submission

Full paper submissions to Cloud and Trusted Computing 2015 (C&TC 2015) must
present original, highly innovative, prospective and forward-looking
research in one or more of the themes given above. Full papers must break
new ground, present new insight, deliver a significant research contribution
and provide validated support for its results and conclusions. Successful
submissions typically represent a major advance for the field of cloud
computing, referencing and relating the contribution to existing research
work, giving a comprehensive, detailed and understandable explanation of a
system, study, theory or methodology, and support the findings with a
compelling evaluation and/or validation. Each paper must be submitted as a
single PDF file in Springer Lecture Notes in Computer Science format (not
longer than 18 pages in length). Accepted regular papers will be included in
the printed conference main proceedings and presented in the paper sessions.
Submissions to C&TC 2015 must not be under review by any other conference or
publication at any time during the C&TC review cycle, and must not be
previously published or accepted for publication elsewhere.

Notes (not longer than 6 pages in length) must report new results and
provide support for the results, as a novel and valuable contribution to the
field – just like full papers. Notes are intended for succinct work that is
nonetheless in a mature state ready for inclusion in archival proceedings.
Notes will be held to the same standard of scientific quality as full
papers, albeit for a shorter presentation, and must still state how they fit
with respect to related work, and provide a compelling explanation and
validation. Notes must be submitted as single PDF file in Springer Lecture
Notes in Computer Science format. Accepted notes will be published in the
conference main proceedings and will be presented in the paper sessions of
the conference.

A selection of the best papers from Cloud and Trusted Computing 2015 will be
published in a special issue of The International Journal of Computer
Systems Science and Engineering.

Submissions are to be made to the submission web site available at

The paper and notes submission site giving all the relevant submission
details is located at:
Failure to comply with the formatting instructions for submitted papers or
notes will lead to the outright rejection of the paper without review.
Failure to commit to presentation at the conference automatically excludes a
paper from the proceedings.

Program Chairs

- Claudio Agostino Ardagna, Universita' degli studi di Milano, Italy
- Meiko Jensen, Independent Centre for Privacy Protection
Schleswig-Holstein, Germany

Advisory Committee

- Ernesto Damiani, Universita' degli studi di Milano, Italy
- Salim Hariri, The University of Arizona, USA
- Robert Meersman, Vrije Universiteit Brussel, Belgium
- Siani Pearson, HP Labs, UK

Program Committee

- Marco Anisetti, Universita' degli Studi di Milano, Italy
- Vijay Atluri, Rutgers University, USA
- N. Balakrishnan, Indian Institute of Science, India
- Endre Bangerter, Bern University of Applied Sciences, Switzerland
- Michele Bezzi, SAP, France
- Bud Brugger, Fraunhofer IAO, Germany
- Marco Casassa Mont, HP Labs, UK
- David Chadwick, University of Kent, UK
- Henry Chan, The Hong Kong Polytechnic University
- Alfredo Cuzzocrea, University of Calabria, Italy
- Ernesto Damiani, Università degli Studi di Milano, Italy
- Stefan Dessloch, University of Kaiserslautern, Germany
- Francesco Di Cerbo, SAP Labs, France
- Scharam Dustdar, Technical University of Vienna, Austria
- Stefanos Gritzalis, University of the Aegean, Greece
- Nils Gruschka, FH Kiel, Germany
- Marit Hansen, Unabhangiges Landeszentrum fur Datenschutz
Schleswig-Holstein, Kiel, Germany
- Ching Hsien Hsu, Chung Hua University, Taiwan
- Patrick Hung, University of Ontario, Canada
- Martin Jaatun, SINTEF ICT, Norway
- Florian Kerschbaum, SAP, Germany
- Ryan Ko, University of Waikato, New Zealand
- Zhiqiang Lin, UT Dallas, USA
- Luigi Lo Iacono, Cologne University of Applied Sciences, Germany
- Gregorio Martinez, University of Murcia, Spain
- Hadi Otrok, Khalifa University, Abu Dhabi, UAE
- Smriti R. Ramakrishnan, Oracle Corporation, USA
- Damien Sauveron, Universite' de Limoges, France
- Jorg Schwenk, Ruhr-Universität Bochum, Germany
- Russell Sears, Pure Storage, USA
- Bhavani Thuraisingham, UT Dallas, USA
- Luca Vigano', King's College London, UK

Publicity Chair

- Fulvio Frati, Universita' degli Studi di Milano, Italy

More information available at

Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi il codice fiscale 80012650158.


-------------- next part --------------
You received this message as a subscriber on the list:
     governance at lists.igcaucus.org
To be removed from the list, visit:

For all other list information and functions, see:
To edit your profile and to find the IGC's charter, see:

Translate this email: http://translate.google.com/translate_t

More information about the Governance mailing list