This page was saved using WebZIP on 01/19/16 18:27:12.
Title: SITIS 2015 - The 11th International Conference on Signal Image  •  Size: 31377

SITIS 2015 - The 11th International Conference on Signal Image Technology & Internet Systems

SITIS 2015 - The 11th International Conference on Signal Image

IWSAC 2015

Third International Workshop on Security Assurance in the Cloud

Collocated with:
November 23-27, 2015, Bangkok, Thailand
Scope of the Workshop
The ongoing merge between Service-Oriented Architectures (SOAs) and the Cloud computing paradigm provides a new environment fostering the integration of services located within company boundaries with those in the Cloud. An increasing number of organizations implement their business processes and applications via runtime composition of services made available in the Cloud by external suppliers. This scenario is changing the traditional view of security introducing new service security risks and threats, and requires re-thinking of current assurance, development, testing, and verification methodologies. In particular, security assurance in the cloud is becoming a pressing need to increase the confidence of the cloud actors that the cloud and its services are behaving as expected, and requires novel approaches addressing SOA and cloud peculiarities. IWSAC 2015 is the third edition of the International Workshop on Security Assurance in the Cloud. It aims to address the security assurance issues related to the deployment of services in the Cloud, along with evaluating their impact on traditional security solutions for software and network systems.

The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and assurance of services implemented in the Cloud, as well as experimental studies in Cloud infrastructures, the implementation of services, and lessons learned. Topics of interest include, but are not limited to: 

• Accountability in the cloud
• Authentication and access control in the cloud
• Challenges in moving critical systems to the cloud
• Cloud audit, certification, and compliance
• Cloud transparency, introspection, and outrospection
• Data security and privacy in the Cloud
• Evidence-based assurance of cloud services
• Information assurance and trust management
• Intrusion detection in the cloud
• Policy compliance
• Security assurance in the cloud
• Security and assurance protocols in the cloud
• Security and privacy in the cloud
• Service level agreements
• Service procurement in the cloud
• Verification of cloud services
Important dates
Submission deadline: September 21, 2015 (11:59 PM American Samoa time)
Acceptance/Reject notification: October 15, 2015
Camera-ready: October 22, 2015
Author Registration: October 22, 2015
Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 8 pages in total including bibliography and well-marked appendices, and must follow the IEEE double columns publication format available at:

A maximum of 2 extra pages can be purchased for the final version of the accepted papers.

Paper submission will only be online via: Easy Chair by selecting track "Workshop on Security Assurance in the Cloud". Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper is required to register with the main conference and present the paper. Accepted papers at the workshop will be published in the conference proceedings and in the IEEE digital library.

Program Co-Chairs
• Claudio A. Ardagna, Universita' degli Studi di Milano, Italy
• Ernesto Damiani, khalifa University, EBTIC, Italy
• Massimo Felici, HP Labs, UK

Program Committee
  • Marco Anisetti, Universita' degli Studi di Milano, Italy
  • Michele Bezzi, SAP, France
  • Valentina Casola, University of Naples Federico II, Italy
  • Mauro Conti, University of Padua, Italy
  • Nora Cuppens-Boulahia, Telecom Bretagne, France
  • Alessandra De Benedictis, University of Naples Federico II, Italy
  • Eduardo Fernandez, Florida Atlantic University, USA
  • William Fitzgerald, UTRC, Ireland
  • Filippo Gaudenzi, Università degli studi di Milano, Italy
  • Nils Gruschka, NEC Laboratories Europe, Germany
  • Meiko Jensen, Southern Denmark University, Denmark
  • Mathias Kohler, SAP, Germany
  • Jesus Luna, Cloud Security Alliance, UK
  • Antonio Mana, Universidad de Malaga, Spain
  • Siani Pearson, HP Labs, UK
  • Julinda Stefa, Sapienza University, Italy

This call for papers and additional information about the conference can be found at


Yes Meet 11th SITIS Conference Headquarters: Organizing Secretariat

Powered by Mosajco CMS