Conference Information
ICCCS' 2018: International Conference on Cloud Computing and Security
http://www.icccsconf.org/index.htmlSubmission Date: |
2018-03-25 |
Notification Date: |
2018-04-20 |
Conference Date: |
2018-06-08 |
Location: |
Haikou, China |
Years: |
4 |
Viewed: 11266 Tracked: 6 Attend: 5
Call For Papers
Cloud computing has emerged as today's most exciting computing paradigm for deploying, managing and offering services by a shared infrastructure, which opens a new door for resolving the conflicts between the explosive growth of digital resource demands and large outlays. However, cloud computing also raises many research challenges, such as research management, data security, privacy, trusted computing. The International Conference on Cloud Computing and Security (ICCCS2018), which is to be held on June 8-10, 2018, aims to address the above challenges. It is targeted to provide an international forum for scientists, researchers, and industrial practitioners to discuss and exchange their new ideas, novel results, work in progress and experience on all issues of cloud computing and security. 1. Cloud Computing Cloud Computing Architecture and Systems Cloud Computing Models, Simulations, Designs, and Paradigms Cloud Management and Operations Dynamic Resource Provision and Consuming Cloud Computing Technologies, Services and Applications 2. Cloud Security Security Evaluation and Benchmarks Based on Cloud Security Policy, Security Theory and Models Based on Big Data Authentication, Authorization and Reliability Issues in Cloud Security and Privacy in Cloud Computing Information Security and Risks Management Machine Learning for Security 3. Information Hiding Coverless Information Hiding Steganography and Steganalysis Digital Watermarking, Fingerprinting and Forensics Multimedia Authentication and Encryption Covert/Subliminal Channels 4. IoT Security Data Security and Privacy in the IoT Attacks and Countermeasures on IoT Systems Trust Model, Data Aggregation and Information Sharing Secure Hardware and Software for IoT Application Security for IoT 5. Multimedia Forensics Active and Passive Forensics Big Data Forensics Portable electronic device forensics Network Forensics Anti-forensics 6. Encryption Measurements for Cybersecurity Post Quantum Cybersecurity Visualization for Security Applied Cryptography Language-based Security Publication Outstanding papers will be invited for possible publication in the following SCI-indexed journals: Ad hoc networks Computers, Materials & Continua Computer Modeling in Engineering & Sciences EURASIP Journal on Wireless Communications and Networking IEEE Access IETE Technical Review International Journal of Sensor Networks Journal of Internet Technology Journal of network and computer applications Multimedia Tools and Applications Neurocomputing Neural Computing and Applications Sensors Soft Computing Wireless Communications and Mobile Computing World Wide Web All the accepted papers will be published as a post-proceedings in Springer-Verlag's Lecture Notes in Computer Science (LNCS) series and indexed by EI.
Last updated by Dou Sun in 2018-03-11
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
ICITKM | International Conference on Information Technology and Knowledge Management | 2018-10-10 | 2018-11-02 |
VECoS | International Conference on Verification and Evaluation of Computer and Communication Systems | 2023-05-29 | 2023-10-18 |
ICMEIM | International Conference on Modern Education and Information Management | 2020-07-31 | 2020-09-25 |
ADBIS | European Conference on Advances in Databases and Information Systems | 2020-04-03 | 2020-08-25 |
HPCC | International Conference on High Performance Computing and Communications | 2023-09-15 | 2023-12-17 |
JIST | The Joint International Semantic Technology Conference | 2019-08-10 | 2019-11-25 |
SOCC | ACM Symposium on Cloud Computing | 2022-06-10 | 2022-11-01 |
HPCCE | International Conference on High Performance Computing and Communication Engineering | 2023-12-17 | 2023-12-22 |
ECKM | European Conference on Knowledge Management | 2020-04-02 | 2020-09-03 |
CSNDSP | International Symposium on Communication Systems, Networks and Digital Signal Processing | 2018-03-14 | 2018-07-18 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
Journal of Big Data | Springer | 2196-1115 | ||
b | Journal of Computer Security | IOS Press | 0926-227X | |
b | Computers & Security | 4.438 | Elsevier | 0167-4048 |
IEEE Cloud Computing Magazine | IEEE | 2325-6095 | ||
ACM Computing Surveys | ACM | 0360-0300 | ||
International Journal on Cloud Computing: Services and Architecture | AIRCC | 2231-6663 | ||
c | Behaviour & Information Technology | 1.388 | Taylor & Francis | 0144-929X |
Computer Fraud & Security | Elsevier | 1361-3723 | ||
c | IET Information Security | 0.862 | IET | 1751-8709 |
International Journal of Information Security | 1.988 | Springer | 1615-5262 |
Full Name | Impact Factor | Publisher |
---|---|---|
Journal of Big Data | Springer | |
Journal of Computer Security | IOS Press | |
Computers & Security | 4.438 | Elsevier |
IEEE Cloud Computing Magazine | IEEE | |
ACM Computing Surveys | ACM | |
International Journal on Cloud Computing: Services and Architecture | AIRCC | |
Behaviour & Information Technology | 1.388 | Taylor & Francis |
Computer Fraud & Security | Elsevier | |
IET Information Security | 0.862 | IET |
International Journal of Information Security | 1.988 | Springer |
Recommendation