ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Reply To:
Fri, 8 Jan 2016 12:46:28 +1100
text/plain (94 lines)
Call for Papers

IEEE Cloud Computing

Special Issue on Cloud Security

Submission deadline: 29 February 2016
Publication date: September/October 2016

Many critical applications - from medical, financial, and big data
applications to applications with real-time constraints - are being
migrated to cloud platforms. It’s been predicted that the bulk of
future IT infrastructure spending will be on cloud platforms and
applications, and nearly half of all large enterprises are planning
cloud deployments by the end of 2017.

However, cloud computing systems and services are also major targets
for cyberattackers. Because the cloud infrastructure is always, to a
certain degree, an open and shared resource, it’s subject to
malicious attacks from both insiders and outsiders. Side-channel
attacks, identity hijacking, and distribution of malicious code have
all been observed. Thus, centralized management of security in cloud
environments needs to be carefully analyzed and maintained.

These vulnerabilities point to the importance of protecting cloud
platforms, infrastructures, hosted applications, and information data,
and create demand for much higher-level cloud security management
than is available today. This calls for comprehensive vulnerability
analyses and massive theoretical and practical innovation in security
technologies. This special issue aims to address these needs. Areas of
interest for the special issue include, but are not limited to: 

- Access control mechanisms for clouds
- Cloud security management
- Colluding attacks over multiple clouds
- Distributed denial of service in clouds
- Information retrieval on encrypted data in clouds
- Information sharing and data protection in clouds
- Intrusion detection in clouds
- Privacy policy framework for clouds
- Secure applications distributed over clouds
- Secure big data in clouds
- Security architectures for mobile cloud computing
- Security in software-de ned networks.
- Security protocols for cloud computing
- Trust computing for meshed cloud services
- Virtualization of security in clouds

Special Issue Guest Editors:
- Peter Mueller, IBM Zurich Research Laboratory, Zurich, Switzerland
- Chin-Tser Huang, University of South Carolina, USA
- Shui Yu, Deakin University, Australia
- Zahir Tari, RMIT University, Australia
- Ying-Dar Lin, National Chiao Tung University, Hsinchu, Taiwan

Submission Information:
Submissions should be 4,000 to 6,000 words long and should follow the
magazine’s guidelines on style and presentation. All submissions will
be subjected to single-blind, anonymous review in accordance with
normal practice for scientific publications. For more information,
contact the guest editors at [log in to unmask]

Authors should not assume that the audience will have specialized
experience in a particular subfield. All accepted articles will be
edited according to the IEEE Computer Society style guide
Submit your papers to Manuscript Central at



Shui YU, PhD, Senior Lecturer

School of Information Technology, Deakin University,

221 Burwood Highway, Burwood, VIC 3125,  Australia.

Telephone:0061 3 9251 7744

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see