Conference Information
ICCCS' 2018: International Conference on Cloud Computing and Security
http://www.icccsconf.org/index.html
Submission Date:
2018-03-25
Notification Date:
2018-04-20
Conference Date:
2018-06-08
Location:
Haikou, China
Years:
4
Viewed: 11810   Tracked: 6   Attend: 5

Call For Papers
Cloud computing has emerged as today's most exciting computing paradigm for deploying, managing and offering services by a shared infrastructure, which opens a new door for resolving the conflicts between the explosive growth of digital resource demands and large outlays. However, cloud computing also raises many research challenges, such as research management, data security, privacy, trusted computing.

The International Conference on Cloud Computing and Security (ICCCS2018), which is to be held on June 8-10, 2018, aims to address the above challenges. It is targeted to provide an international forum for scientists, researchers, and industrial practitioners to discuss and exchange their new ideas, novel results, work in progress and experience on all issues of cloud computing and security.

1. Cloud Computing
    Cloud Computing Architecture and Systems
    Cloud Computing Models, Simulations, Designs, and Paradigms
    Cloud Management and Operations
    Dynamic Resource Provision and Consuming
    Cloud Computing Technologies, Services and Applications
2. Cloud Security
    Security Evaluation and Benchmarks Based on Cloud
    Security Policy, Security Theory and Models Based on Big Data
    Authentication, Authorization and Reliability Issues in Cloud
    Security and Privacy in Cloud Computing
    Information Security and Risks Management
    Machine Learning for Security
3. Information Hiding
    Coverless Information Hiding
    Steganography and Steganalysis
    Digital Watermarking, Fingerprinting and Forensics
    Multimedia Authentication and Encryption
    Covert/Subliminal Channels
4. IoT Security
    Data Security and Privacy in the IoT
    Attacks and Countermeasures on IoT Systems
    Trust Model, Data Aggregation and Information Sharing
    Secure Hardware and Software for IoT
    Application Security for IoT
5. Multimedia Forensics
    Active and Passive Forensics
    Big Data Forensics
    Portable electronic device forensics
    Network Forensics
    Anti-forensics
6. Encryption
    Measurements for Cybersecurity
    Post Quantum Cybersecurity
    Visualization for Security
    Applied Cryptography
    Language-based Security

Publication

Outstanding papers will be invited for possible publication in the following SCI-indexed journals:
Ad hoc networks
Computers, Materials & Continua
Computer Modeling in Engineering & Sciences
EURASIP Journal on Wireless Communications and Networking
IEEE Access
IETE Technical Review
International Journal of Sensor Networks
Journal of Internet Technology
Journal of network and computer applications
Multimedia Tools and Applications
Neurocomputing
Neural Computing and Applications
Sensors
Soft Computing
Wireless Communications and Mobile Computing
World Wide Web

All the accepted papers will be published as a post-proceedings in Springer-Verlag's Lecture Notes in Computer Science (LNCS) series and indexed by EI.
Last updated by Dou Sun in 2018-03-11
Related Conferences
Related Journals
CCFFull NameImpact FactorPublisherISSN
Journal of Big Data Springer2196-1115
bJournal of Computer Security IOS Press0926-227X
bComputers & Security4.438Elsevier0167-4048
IEEE Cloud Computing Magazine IEEE2325-6095
ACM Computing SurveysACM0360-0300
International Journal on Cloud Computing: Services and Architecture AIRCC2231-6663
cBehaviour & Information Technology1.388Taylor & Francis0144-929X
Computer Fraud & Security Elsevier1361-3723
cIET Information Security0.862IET1751-8709
International Journal of Information Security1.988Springer1615-5262
Recommendation