2019 ACM Cloud Computing Security Workshop (CCSW) at CCS – 10th Anniversary Edition

Haziran 12, 2019

November 11, 2019, London, UK
Website

(submission due 48 hours after CCS notification deadline)

DATES

Submissions due (48 hours after CCS notification):
1 August, 2019 (midnight anywhere in the world)

Submission URL:
https://easychair.org/conferences/?conf=ccsw2019

SUMMARY

Clouds and massive-scale computing infrastructures are starting to
dominate computing and will likely continue to do so for the
foreseeable future.  Major cloud operators are now comprising
millions of cores hosting substantial fractions of corporate and
government IT infrastructure.

CCSW is the world’s premier forum bringing together researchers and
practitioners in all security aspects of cloud-centric and outsourced
computing, including but not limited to:

+ side channel attacks
+ practical cryptographic protocols for cloud security
+ secure cloud resource virtualization mechanisms
+ secure data management outsourcing (e.g., database as a service)
+ practical privacy and integrity mechanisms for outsourcing
+ foundations of cloud-centric threat models
+ secure computation outsourcing
+ remote attestation mechanisms in clouds
+ sandboxing and VM-based enforcements
+ trust and policy management in clouds
+ secure identity management mechanisms
+ new cloud-aware web service security paradigms and mechanisms
+ cloud-centric regulatory compliance issues and mechanisms
+ business and security risk models and clouds
+ cost and usability models and their interaction with security
+ scalability of security in global-size clouds
+ trusted computing technology and clouds
+ binary analysis for remote attestation and cloud protection
+ network security (DOS, IDS etc.) mechanisms for cloud contexts
+ security for emerging cloud programming models
+ energy/cost/efficiency of security in clouds
+ machine learning for cloud protection

CCSW especially encourages novel paradigms and controversial ideas
that are not on the above list.  The workshop has historically acted
as a fertile ground for creative debate and interaction in
security-sensitive areas of computing impacted by clouds.

CCSW is soliciting full papers of up to 12 pages which will be judged
based on the quality per page.  Thus, shorter, high-quality papers
are encouraged, and papers may be perceived as too long if they are
repetitive or verbose.  Submissions must be single PDF files, no more
than 12 pages long in double-column ACM format (the sigconf template
from https://www.acm.org/publications/proceedings-template, with a
simpler version at https://github.com/acmccs/format), excluding the
bibliography, well-marked appendices, and supplementary material.
Note that reviewers are not required to read the appendices or any
supplementary material.  Authors should not change the font or the
margins of the ACM format.  Submissions not following the required
format may be rejected without review.  Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Accepted papers will be published by the ACM Press and/or the ACM
Digital Library.

Submissions must be anonymous, and authors should refer to their
previous work in the third-person.  Submissions must not
substantially overlap with papers that have been published or that
are simultaneously submitted to a journal or a conference with
proceedings.  Each accepted paper must be presented by one registered
author.  Submissions not meeting these guidelines risk immediate
rejection.  For questions about these policies, please contact the
chairs.

*** Both research and position/vision/white papers are invited ***

Submissions must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All authors and their affiliations must
be listed.

Proposals for panels are also solicited. The proposals are to be
concise, up to 2 pages in length, describe the handled topics, name
potential panelists and briefly scope the panel for CCSW. Disruptive
and controversial panels are particularly encouraged.

KEYNOTE SPEAKERS

TBA. Multiple highly-visible CTOs, CISOs and applied researchers.

Organizers ======================

STEERING

Srdjan Capkun, ETH Zurich
Emiliano De Cristofaro, University College London
Kristin Lauter, Microsoft Research
Radu Sion, Stony Brook University (chair)
Yinqian Zhang, Ohio State University

CHAIRS

Charalampos (Babis) Papamanthou, University of Maryland
Radu Sion, Stony Brook University

PROGRAM COMMITTEE

Ahmad-Reza Sadeghi, TU Darmstadt
Alp Kupcu, Koc University
Amir Herzberg, University of Connecticut
Anil Somayaji, Carleton University
Anrin Chakraborti, Stony Brook University
Bogdan Carbunar, FIU
Cedric Lauradoux, INRIA
Charles Wright, Portland State University
Cristina Nita-Rotaru, Northeastern University
Dimitris Papadopoulos, UST Hong Kong
Erik-Oliver Blass, Northeastern University
Evgenios Kornaropoulos, Brown University
Ghassan Karame, NEC Labs Germany
Giorgos Vasiliadis, Foundation for Research and Technology – Hellas
Giuseppe Persiano, University of Salerno
Ioannis Demertzis, University of Maryland (UMD)
Kevin Butler, University of Florida
Leendert van Doorn, Microsoft
Matthias Schunter, Intel Labs
Mike Rosulek, Oregon State University
Moti Yung, Google
Nigel Smart, KU Leuven
Nikos Triandopoulos, Stevens Institute of Technology
Peng Ning, Google
Pierangela Samarati, Universita` degli Studi di Milano
Reihaneh Safavi-Naini, University of Calgary
Reza Curtmola, New Jersey Institue of Technology
Roberto Di Pietro, HBKU College of Science and Engineering Doha-Qatar
Sean Smith, Dartmouth College
Stefan Katzenbeisser, University of Passau
Tarik Moataz, Brown University
Thomas Schneider, TU Darmstadt
Tianwei Zhang, Amazon
Vassilis Zikas, University of Edinburgh
Xiao Wang, Northwestern University
Yingjiu Li, Singapore Management University
Yuqiong Sun, Symantec Labs
Zhiqiang Lin, Ohio State University