[FM-India] CFP: 9th International Symposium on Secure Virtual Infrastructures - Cloud and Trusted Computing (C&TC 2019)

Claudio A. Ardagna claudio.ardagna at unimi.it
Wed May 15 21:31:47 IST 2019

[Apologies if you receive multiple copies of this message]

9th International Symposium on Secure Virtual Infrastructures --
Cloud and Trusted Computing (C&TC 2019)
October 21-22, 2019 -- Rhodes, Greece,


Current and future service-based software needs to remain focused
towards the development and deployment of large and complex intelligent
and networked information systems, required for internet-based and
intranet-based systems in organizations, as well to move to IoT
integration and big data analytics. Today, service-based software covers
a very wide range of application domains as well as technologies and
research issues. This has found realization through Cloud Computing, Big
Data, and IoT. Vital element in such networked, virtualized, and
sensor-based information systems are the notions of trust, security,
privacy and risk management.
Cloud and Trusted Computing (C&TC 2019) is the 9th International
Symposium on Cloud Computing, Trusted Computing and Secure Virtual
Infrastructures, organized as part of the OnTheMove Federated
Conferences & Workshops. C&TC 2019 will be held in Rhodes, Greece.
The conference solicits submissions from both academia and industry
presenting novel research in the context of Cloud Computing, Big Data,
and IoT, presenting theoretical and practical approaches to cloud, big
data, and IoT trust, security, privacy and risk management. The
conference will provide a special focus on the intersection between
cloud paradigm, big data analytics, and IoT integration, bringing
together experts from the three communities to discuss on the vital
issues of trust, security, privacy and risk management in Cloud
Computing, shedding the light on novel issues and requirements in big
data and IoT domains. Potential contributions could cover new
approaches, methodologies, protocols, tools, or verification and
validation techniques. We also welcome review papers that analyze
critically the current status of trust, security, privacy and risk
management in the Cloud, Big Data, and IoT. Papers from practitioners
who encounter trust, security, privacy, and risk management problems,
and seek understanding are finally welcome.


Topics of interest are classified in four main themes and include, but
are not limited to:

- Assurance Techniques
- Access Control, Authorization, and Authentication
- Big data security and privacy
- Blockchain
- Cloud Computing with Autonomic and Trusted Environment
- Cooperative systems
- Cryptographic Algorithms and Protocols
- Cyber Attack, Crime and Cyber War
- DRM, Watermarking Technology, IP Protection
- Emergency and Security Systems
- End-to-end security over complex cloud supply chain
- Forensics
- Human Interaction with Trusted and Autonomic Computing Systems
- Identity and Trust Management
- IoT security and privacy
- Multimedia Security Issues over Mobile and Wireless Clouds
- Network Security
- Networks of Trust, Clouds of Trust
- Privacy, Anonymity
- Privilege Management Infrastructure
- Reliable Computing and Trusted Computing
- Risk evaluation and Management
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- Security Models and Quantifications
- Self-protection and Intrusion-detection in Security
- Trust Evaluation and Prediction in Service-Oriented Environments
- Trust, Security, Privacy and Confidentiality
- Trust in big data analytics
- Trust in IoT environments
- Trusted Cloud-Edges computations
- Trusted Computing in virtualized environments
- Trusted Execution Environments
- Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, XaaS
- Virus Detections and Anti-virus Techniques/Software

- Algorithms and Computations on Encrypted Data
- Big Data, Frameworks and Systems for Parallel and Distributed Computing
- Big Data Processing and Analytics
- Big Data Preparation
- Big Data Representation
- Big Data Visualization- Database as a Service, Multi-tenancy, Data
management and analytics as a service
- Data Provenance
- Data Integrity
- Data Science and Scalable Machine Learning
- Elasticity and Scalability for Cloud Data Management Systems
- Encryption Systems for IoT Data
- High Availability and Reliability
- Interoperability between Clouds- New Protocols, Interfaces and Data
Models for Cloud Databases
- Resource and Workload Management in Cloud Databases
- Sensor-Based Data Collection, Management, and Security
- Service Level Agreements and Contracts
- Transactional Models for Cloud Databases, Consistency and Replication
- Threats and countermeasures
- Virtualization and Cloud databases, Storage Structures and Indexing

- Autonomic Computing Theory, Models, Architectures and Communications
- Big Data Infrastructures
- Cloud Resource provisioning with QoS Guarantees
- Cloud Operation and Resource Management
- Cloud Performance Modeling and Benchmarks
- Datacenter Architecture and Management
- Formal methods and Tools for Cloud computing
- Infrastructures for Social Computing and Networking
- IoT Infrastructures
- NoSQL Databases
- Software Architectures and Design for Trusted Emerging Systems
- Virtualized Computing Infrastructures

- Big Data Applications and Case Studies
- Cloud Business Applications and Case Studies
- Clouds and Social Media, Network and Link Analysis
- Data Intensive Applications
- IoT Applications and Case Studies
- Large Scale Cloud Applications, Reality Mining
- Mobile Cloud Services
- New Parallel / Concurrent Programming Models for Cloud Computing
- Pervasive / Ubiquitous Computing in the Cloud
- Reliability, Fault Tolerance, Quality-of-Service
- Service Level Agreements and Performance Measurement
- Service-Oriented Architectures, RESTful Services in Cloud Environments

Important Dates

Conference Paper Submission Deadline: July 15, 2019
Acceptance Notification:  Aug 13, 2019
Camera Ready Due:  Aug 30, 2019
Author Registration Due:  Aug 30, 2019

Paper Submission

Regular paper submissions to Cloud and Trusted Computing 2019 (C&TC
2019) must present original, highly innovative, prospective and
forward-looking research in one or more of the themes given above. Full
papers must break new ground, present new insight, deliver a significant
research contribution and provide validated support for its results and
conclusions. Successful submissions typically represent a major advance
for the fields of cloud computing, big data, and IoT referencing and
relating the contribution to existing research work, giving a
comprehensive, detailed and understandable explanation of a system,
study, theory or methodology, and support the findings with a compelling
evaluation and/or validation. Each paper must be submitted as a single
PDF file in Springer Lecture Notes in Computer Science format (no longer
than 18 pages in length). Accepted regular papers will be included in
the conference main proceedings and presented in the paper sessions.
Submissions to C&TC 2019 must not be under review by any other
conference or publication at any time during the C&TC review cycle, and
must not be previously published or accepted for publication elsewhere.

Short papers (not longer than 8 pages in length) must report new results
and provide support for the results, as a novel and valuable
contribution to the field – just like full papers. Short papers are
intended for succinct work that is nonetheless in a mature state ready
for inclusion in archival proceedings. Short papers will be held to the
same standard of scientific quality as full papers, albeit for a shorter
presentation, and must still state how they fit with respect to related
work, and provide a compelling explanation and validation. Short papers
must be submitted as single PDF file in Springer Lecture Notes in
Computer Science format. Accepted short papers will be published in the
conference main proceedings and will be presented in the paper sessions
of the conference.

Paper submission site: https://easychair.org/conferences/?conf=otm2019

The paper and notes submission site giving all the relevant submission
details is located at:
Failure to comply with the formatting instructions for submitted papers
or notes will lead to the outright rejection of the paper without
review. Failure to commit to presentation at the conference
automatically excludes a paper from the proceedings.

Program Chairs

- Claudio Agostino Ardagna, Universita' degli Studi di Milano, Italy
- Ernesto Damiani, Universita' degli Studi di Milano, Italy
- Athanasios Vasilakos, Lulea University of Technology, Sweden

Program Committee

- Marco Anisetti, Universita' degli Studi di Milano, Italy
- Rasool Asal, British Telecommunications, UK
- Valerio Bellandi, Universita' degli Studi di Milano, Italy
- Adrian Belmonte, ENISA, Greece
- Michele Bezzi, SAP, France
- Ashok Kumar Das, International Institute of Information Technology, India
- Scharam Dustdar, Technical University of Vienna, Austria
- Nabil El Ioini, Free University of Bozen, Italy
- Stefanos Gritzalis, University of the Aegean, Greece
- Meiko Jensen, Unabhängiges Landeszentrum für Datenschutz
Schleswig-Holstein, Kiel, Germany
- George Karabatis, University of Maryland, USA
- Patrick Hung, University of Ontario, Canada
- Miguel Vargas Martin, University of Ontario, Canada
- Weizhi Meng, Technical University of Denmark, Denmark
- Antonio Munoz, University of Malaga, Spain
- Evangelos Rekleitis, ENISA, Greece
- Stefan Schulte, Technical University of Vienna, Austria
- Julian Schuette, Fraunhofer, Germany
- Jun Shen, University of Wollongong, Australia
- Christos XENAKIS, University of Piraeus, Greece
- Jingwei Yang, California State University, USA
- Chia-Mu Yu, National Chung Hsing University, Taiwan
- Shangguang Wang, Beijing University of Posts and Telecommunications, China

Publicity Chair

- Nabil El Ioini, Free University of Bozen, Italy

More information available at http://otmconferences.org

More information about the FMIndia mailing list