The 10th International Conference on Signal Image Technology & Internet Systems

The 10th International Conference on Signal Image Technology

IWSAC 2014


Second International Workshop on Security Assurance in the Cloud

Collocated with:
 
November 23-27, 2014 - Marrakech, Morocco
 
Scope of the Workshop
The ongoing merge between Service-Oriented Architectures (SOAs) and the Cloud computing paradigm provides a new environment fostering the integration of services located within company boundaries with those in the Cloud. An increasing number of organizations implement their business processes and applications via runtime composition of services made available in the Cloud by external suppliers. This scenario is changing the traditional view of security introducing new service security risks and threats, and requires re-thinking of current assurance, development, testing, and verification methodologies. In particular, security assurance in the cloud is becoming a pressing need to increase the confidence of the cloud actors that the cloud and its services are behaving as expected, and requires novel
approaches addressing SOA and cloud peculiarities.
IWSAC 2014 is the continuation of the International Workshop on Securing Services on the Cloud, held in September 2011, Milan, Italy. It aims to address the security assurance issues related to the deployment of services in the Cloud, along with evaluating their impact on traditional security solutions for software and network systems.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and assurance of services implemented in the Cloud, as well as experimental studies in Cloud infrastructures, the implementation of services, and lessons learned.
 
Topics for the workshop include, but are not limited to:
  • Authentication and access control in the cloud
  • Challenges in moving critical systems to the cloud
  • Cloud accountability
  • Cloud audit
  • Cloud compliance
  • Cloud certification
  • Cloud transparency, introspection, and outrospection
  • Cybersecurity in the cloud
  • Data security and privacy on the Cloud
  • Information assurance and trust management
  • Intrusion detection in the Cloud
  • Security assurance in the cloud
  • Security and assurance protocols in the Cloud
  • Service level agreements
  • Service procurement in the cloud
  • Service verification in critical cloud services
  • Test-based and monitoring-based verification of cloud services
 
Important dates
Submission deadline: September 6, 2014 September 22, 2014
Acceptance/Reject notification: October 10, 2014
Camera-ready: October 15, 2014 October 21, 2014
Author Registration: October 19, 2014 October 23, 2014
 
Submission
Each submission should be at most 8 pages in total including bibliography and well-marked appendices, and must follow the IEEE double columns publication format available at:
Paper submission will only be online via: Easy Chair.
Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.
All submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of expression by at least two reviewers. The organizers will examine the reviews and make final paper selections.
 
Publication
All the papers accepted for the workshop will be included in the conference proceedings. The proceedings will be published by IEEE Computer Society. Content will be submitted to the indexing companies for possible indexing. They will be available at the conference.
 
Registration
At least one author of each accepted paper must register for the workshop. Workshop registration fee is determined by SITIS. A single registration for the workshop or the conference allows attending both events.

General Chair (SITIS General Chair)
  • Ernesto Damiani, Universita' degli Studi di Milano, Italy
 
Program Co-Chairs
  • Marco Anisetti, Universita' degli Studi di Milano, Italy
  • Claudio A. Ardagna, Universita' degli Studi di Milano, Italy
  • Rasool Asal, British Telecommunications, UK/UAE
 
Publicity Chair
  • Valerio Bellandi, Universita' degli Studi di Milano, Italy

Web Chair
  • Fulvio Frati, Universita' degli Studi di Milano, Italy
 
Program Committee
  • Rafael Accorsi, University of Freiburg, Germany
  • Valerio Bellandi, Universita' degli Studi di Milano, Italy
  • Michele Bezzi, SAP, France
  • Mauro Conti, University of Padua, Italy
  • Nora Cuppens-Boulahia, Telecom Bretagne, France
  • Ernesto Damiani, Universita' degli Studi di Milano, Italy
  • Eduardo Fernandez, Florida Atlantic University, USA
  • Atsuhiro Goto, Institute of Information Security, Japan
  • Nils Gruschka, NEC Laboratories Europe, Germany
  • Patrick Hung, University of Ontario Institute of Technology, Canada
  • Meiko Jensen, Southern Denmark University, Denmark
  • Florian Kerschbaum, SAP, Germany
  • Nicolas Larrieu, ENAC, France
  • Antonio Mana, Universidad de Malaga, Spain
  • Siani Pearson, HP Labs, UK
  • George Spanoudakis, City University of London, UK
Contact

Organizers


Yes Meet 10th SITIS Conference Organizing Secretariat
E-mail: info@sitis-conf.org