Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[protege-discussion] CFP: PriSecCSN'12 (Privacy and Security in Cloud and Social Networks), 1-3 Nov. 2012, Xiangtan, China

Chang Liu changliu.aus at
Sun Jun 10 04:34:14 PDT 2012

We apologize for any cross-postings.

Call for papers: The 2012 International Symposium on Privacy and Security
in Cloud and Social Networks (PriSecCSN 2012), 1-3 Nov. 2012, Xiangtan,

The website is:

Important dates:
Deadline for Paper Submission: June 25, 2012
Notification of Acceptance: July 30, 2012
Camera Ready Copies: August 10, 2012

Submission site and requirements: Please submit your
paper(s) in PDF file.

Papers should be limited up to 8 pages in IEEE CS format. The template
files for LATEX or WORD can be downloaded from the symposium website. All
papers will be peer reviewed by two or three pc members. Submitting a paper
to the symposium means that if the paper is accepted, at least one author
should register to CGC2012 and attend the conference to present the paper.

All accepted papers will appear in the proceedings published by IEEE
Computer Society (EI indexed). Selected papers will be invited to special
issues of CGC2012 in Concurrency and Computation: Practice and Experience,
Future Generation Computer Systems and International Journal of High
Performance Computing Applications.

Social network analysis and cloud computing are two of the most exciting
new trends in the recent developments of information technology. As the new
generation computing paradigm, cloud enables computing resources to be
provided as IT services in a pay-as-you-go fashion with high efficiency and
effectiveness. With the popularity of social software as well as the fast
development of cloud and other high-performance computing infrastructures,
the outcome of social network analysis is becoming more and more
attractive. However, information privacy and security issues are major
challenges in both these areas. This symposium aims at providing a forum
for researchers, practitioners and developers from different background
areas such as distributed computing, social computing, information security
and privacy protection areas to exchange the latest experience, research
ideas and synergic research and development on fundamental issues and
applications about security and privacy issues in cloud environments and
social networks. The symposium solicits high quality research results in
all related areas.

The objective of this symposium is to invite authors to submit original
manuscripts that demonstrate and explore current advances in all aspects of
security and privacy in cloud
computing environments. The symposium solicits novel papers on a broad
range of topics, including but not limited to:

Security and privacy in Big Data management
Application of modern cryptography in cloud and social networks
Emerging threats in cloud-based services
Multi-tenancy related security/privacy issues
Secure virtualisation mechanisms
Vulnerabilities in cloud infrastructure
Vulnerabilities in MapReduce
Security modelling and threats in cloud computing
Security/privacy in hybrid cloud
Auditing in cloud computing
Access control in cloud computing
Secure Job deployment and scheduling
Secure resource allocation and indexing
User authentication in cloud services
Practical privacy and integrity mechanisms for data outsourcing
Foundations of cloud-centric threat models
Information hiding
Trust and policy management in cloud
Secure identity management mechanisms
Security/privacy/trust issues in SaaS/PaaS/IaaS
Business and security risk models
Cost and usability models related security issues in clouds
Security for emerging cloud programming models
Remote data integrity protection
Securing distributed data storage in the cloud
Data-centric security and data classification
Security and privacy in mobile cloud
Intrusion detection/prevention
Malware propagation in social networks
Information leakage via social networks
Social currency mechanisms - potential and risks
Privacy management in social networks - access controls, permissions
Identity theft in social networks
Collaborative detection of distributed network attacks
Peer-to-peer based security mechanisms
Trust and reputation in social networks
Socially inspired network security architectures
Socially aware network security protocols
Security configuration based on social contexts groups (social-firewall,
authentication protocols, etc.)
Configuring security protocol parameters based on social information
Privacy-preserving methods for data access and data mining
Domain Security
Privacy Requirements Engineering
Private Information Retrieval
Privacy and Security in Personal Health Records
Online Social Footprints
Secure Multi-party Computation
Privacy Mechanisms in Services
Pseudonymity and Anonymity Modelling
Software Security Engineering
Integrity Verification
Trust Development in Collaboration Teams
Usable Privacy Design
Privacy Aware Access Control Model
Multi-Faceted Privacy Preservation
Access Control and RBAC Policies

General Chairs:

Philip S. Yu, University of Illinois at Chicago, USA
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Vijay Varadharajan, Macquarie University, Australia

Program Chairs:

Chang Liu, University of Technology, Sydney, Australia
Rajiv Ranjan, CSIRO, Australia
Jinjun Chen, University of Technology, Sydney, Australia

Program Committee:

Rose-Mharie ?hlfeldt, University of Sk?vde, Sweden
Cristina Alcaraz, University of Malaga, Spain
Basel Alomair, University of Washington, USA
Alessandro Armando, Universita` di Genova, Italy
Reza Azarderakhsh, University of Waterloo, Canada
Shlomi Dolev, Ben-Gurion University, Israel
Rino Falcone, National Research Council, Italy
Debasis Giri, Haldia Institute of Technology, India
Dieter Gollmann, TU Hamburg-Harburg, Germany
Kartik Gopalan, SUNY – Binghamton, USA
Victor Govindaswamy, Texas A&M University – Texarkana, USA
Shuguo Han, Institute for Infocomm Research, Singapore
Ching-Hsien Hsu, Chung Hua University, Taiwan
Meiko Jensen, Ruhr University Bochum, Germany
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Changhoon Lee, Hanshin University, Korea
Sjouke Mauw, University of Luxembourg, Luxembourg
Yves-Alexandre de Montjoye, MIT, USA
Charles Morisset, IIT - CNR, Italy
David Naccache, ENS, France
Stefano Paraboschi, Universita` degli Studi di Bergamo,Italy
Gerard Parr, University of Ulster, UK
Siani Pearson, HP Labs, UK
Guenther Pernul, University of Regensburg, Germany
Radha Poovendran, University of Washington, USA
Rami Puzis, Ben Gurion University, Israel
Peter Ryan, University of Luxembourg, Luxembourg
Jean-Marc Seigneur, University of Geneva, Switzerland
Abhinav Srivastava, AT&T Research, USA
Yevgeniy Vahlis, AT&T, USA
Guilin Wang, University of Wollongong, Australia
KE WANG, Simon Fraser University, Burnaby
Yang Xiang, Deakin University, Australia
John Zic, CSIRO, Australia

Any inquiries, please direct to Chang Liu at at
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the protege-discussion mailing list