Monday, 18 August 2014

Enterprise Security 2014 deadline extended: August 30, 2014

Scope:

Enterprise security is the key to achieving global information
security in business and organizations. Cloud computing is a new
paradigm for enterprise where businesses need to be secured. However,
this new trend needs to be more systematic with respect to cloud
security, which is a factor in sustaining cloud technology by
building-in trust. For example, current challenges with cyber security
and application security flaws are highlighting important lessons to
be learned and also lead to the adoption of best practices. Similarly,
as the demand for cloud services increases, the importance of security
and privacy will also increase.

One solution is to develop a framework for enterprise security to
analyze and model organizational security of the cloud and its data.
In particular, cloud data and cloud storage technologies (Amazon s3,
drop box, Google drive, etc.) have now become normal practice for
almost every computing user. This can explain why building trust for
cloud users is one of the main focuses of cloud computing research. On
the other hand, the social, human and business aspects of enterprise
security are essential to users to keep their skills, business
concepts and policies up-to-date. By maintaining all these aspects of
security, organizations can develop an enterprise security solution to
work together with business models, such as cloud provider enterprise
model and cloud consumer enterprise model. In this way, enterprise
security can address technical and organizational aspects of security
to provide added value and win-win situations for users, adopters and
service providers.

By blending technical and organizational aspects of security, our
workshop can provide a platform for intellectual discussions and
interactions. To highlight the significance of enterprise security and
disseminate research contributions in cloud community, we welcome
papers addressing technical (implementations, algorithms, experiments,
simulation, modeling and prototypes) and organizational (information
system related issues, recommendation and best practices, frameworks,
risks) issues.

Topics:

    *   Algorithms, software engineering and development
    *   System design and implementation
    *   Testing (software; penetration; product development)
    *   Encryption, access control, identity management
    *   Experiments of using security solutions and proof-of-concepts
    *   Large-scale simulations in the Cloud and Big Data
    *   Intrusion and detection techniques
    *   Risk Modeling, business process modeling
    *   Trust and privacy
    *   Data security, disaster recovery
    *   Data center management
    *   Adoption challenges and recommendation
    *   Risk management and control
    *   Business models
    *   Change management
    *   Information systems related issues
    *   Conceptual frameworks and models
    *   Emerging issues and recommendations for organizational security
    *   E-Commerce and online banking
    *   Social network analysis, emerging issues in social networks
    *   Education and e-Learning
    *   Surveys and their quantitative analysis
    *   Architecture (technical or organizational)
    *   Case studies

Important dates:
Paper Submissions: August 30, 2014
Notification of Acceptance: September 20, 2014
Camera Ready Versions: October 1, 2014
Other relevant information:
https://www.easychair.org/conferences/?conf=es2014 (submission)
http://cipsijoomla.ux.uis.no/cloudcom2014/index.php/workshops?id=48
Submission: https://www.easychair.org/conferences/?conf=es2014
Facebook: https://www.facebook.com/ES2014ECs2015
LinkedIn:
https://www.linkedin.com/groups/Enterprise-Security-international-workshop-8147153

Main chair:

Dr. Victor Chang, Leeds Metropolitan University and University of
Southampton, UK

Co-chairs:

Dr. Muthu Ramachandran, Leeds Metropolitan University, UK
Dr. Gary Wills, University of Southampton, UK
Dr. Robert John Walters, University of Southampton, UK
Dr. Chung-Sheng Li, IBM, US
Prof. Wendy Currie, Audencia Nantes, France

Preliminary Program Committee:

Omar Abdul-Rahman, National Institute of Informatics, Japan
Pekka Abrahamsson, Free University of Bolzano - Bozen, Italy
Saad Alahmari, Princess Noura Bint Abdulrahman University, Saudi Arabia
Mitra Arami, American University of Middle East, Kuwait
Reinhold Behringer, Leeds Metropolitan University, United Kingdom
Tony Bryant, Leeds Metropolitan University, United Kingdom
Rajkumar Buyya, University of Melbourne and Manjrasoft Private
Limited, Australia
K Chandrasekaran, National Institute of Technology Karnataka, India, India
Hsi-ya Chang, National Applied Research Laboratories, Taiwan
David Chadwick, University of Kent, UK
Darren Chong, Singapore, Singapore
Neil Chue Hong, Software Sustainability Institute, University of
Edinburgh, United Kingdom
Lee Gillam, University of Surrey , United Kingdom
Carole Goble, University of Manchester, United Kingdom
Yi-ke Guo, Imperial College, United Kingdom
Takahiro Hirofuchi, National Institute of Advanced Industrial Science
and Technology, Japan
Ching Hsien Robert Hsu, Chung Hua University, Taiwan
Guy-Bertrand Kamga, Alcatel-Lucent, France
Mohamed Mohamed, Institut Mines-Telecom Telecom SudParis Evry, France
Siani Pearson, HP Labs, Bristol, United Kingdom
Muthu Ramachandran, Leeds Metropolitan University, United Kingdom
Fash Safdari, Leeds Metropolitan University, United Kingdom
Z. Cliffe Schreuders, Leeds Metropolitan University, United Kingdom
Jose Simao, Instituto Superior de Engenharia de Lisboa, Portugal
Ian Sommerville, St Andrews University, United Kingdom
Luis Veiga, Inesc-id / Ist, Portugal
David Walker, University of Cardiff, United Kingdom
Dai Watanabe, Hitachi, Japan
Tomasz Wiktor Wlodarczyk, University of Stavanger, Norway
Renyu Yang, Beihang University, China
Fan Zhang, MIT, United States

Many thanks

No comments:

Post a Comment