CALL FOR PAPERS
BigDataSecurity 2015
The IEEE International Symposium on Big Data Security on Cloud
http://csis.pace.edu/ bigdatasecurity/
August 24-26, 2015, New York, USA
****************************** ****************************** ***********************
Important Dates
Paper submission due: May 1, 2015
Acceptance notification: June 15, 2015
Camera-ready due: July 15, 2015
Author registration: July 20. 2015
Conference: Aug. 24-26, 2015
Scope and Topics of Interest
The emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. Researchers and practitioners have embraced cloud computing as a new approach that has the potential for a profound impact in our daily life and world economy.
About 40% data globally would be related to cloud computing by 2020, as estimated by IDC. The large volume of data has big complexity and variety. To avoid system fragility and defend against vulnerabilities exploration from cyber attacker, various security techniques and tools have been developed for Big Data on cloud. There are two important aspects of Big Data Security, especially in cloud computing environment. One is how to protect big data, the other is how to using big data analytic technique to enhance security of the whole system.
The objective of BigDataSecurity 2015 is to provide a forum for scientists, engineers, and researchers to discuss and exchange their new ideas, novel results, work in progress and experience on all aspects of Big Data Security on cloud. Topics of particular interest include, but are not limited to:
-Big data model in New Paradigms
-Big data security
-Big data privacy
-Big data storage, integration, service, mining
-Big data security applications, such as healthcare, transportation, environment, education, business, library, media, finance, etc.
-Cyber hacking, next generation fire wall
-Cyber monitoring, incident response
-Database security, data center security
-Social engineering, insider threats, advance spear phishing
-Cyber threat intelligence
-Security and fault tolerance for embedded or ubiquitous systems
-Tele-health security
-Sensor network security
-Security policy and legal considerations
-Cloud and networking security
-Cloud computing and networking models
-Virtualization for big data on cloud
-MapReduce with cloud for big data processing
-Heterogeneous architecture for cloud computing
-Dynamic resource sharing algorithm for cloud computing
-Load balance for cloud computing
-Mobile cloud computing
-Green cloud computing
-Embedded networks and sensor network optimizations
-Cyber Security in emergent technologies, infrastructures and applications
PAPER SUBMISSION AND PUBLICATION
Submissions should include abstract, 5-10 keywords, and the e-mail address of the corresponding author and be in PDF format. Each submission must not exceed 6 pages in the IEEE 8.5’’ x 11’’ two-column format with 10-12 point font (Template: DOC or LaTeX), including tables and figures. Each accepted paper needs at least one author to register in the conference. Each submission should be regarded as an undertaking that, should the submission be accepted, at least one of the authors must attend the conference to present the work in order that the accepted paper can be put into digital library. The final version of an accepted paper will be limited to 10 pages in IEEE proceeding format. Please submit papers in PDF format through the BigDataSecurity web site. Manuscript should be prepared following the IEEE Computer Society Press Proceedings. Author Guidelines that can be found at: http://www.computer.org/ portal/pages/cscps/cps/cps_ forms.html
The accepted papers have to be presented orally at the conference and will be published by IEEE Computer Society Press (indexed by EI) and included in IEEE Digital Library. Selected best papers will be recommended to the special issues of well-regarded SCI journals..
****************************** ****************************** ***********************
ORGANIZING COMMITTEE
General Chair
Albert Zomaya, University of Sydney, Australia
Program Chair
Bhavani Thuraisingham, University of Texas at Dallas, USA
Yongxin Zhu, Shanghai Jiaotong University, China
Publication Chair
Bin Wang, Wright State University, USA
Publicity Chair
Jingtong Hu, Oklahoma State University, USA
Local Chair
Meikang Qiu, Pace University, USA
Web Chair
Keke Gai, Pace University, USA
Steering Committee
Albert Zomaya, University of Sydney, Australia
Bhavani Thuraisingham, University of Texas at Dallas, USA
Meikang Qiu, Pace University, USA
Yongxin Zhu, Shanghai Jiaotong University, China
BigDataSecurity 2015
The IEEE International Symposium on Big Data Security on Cloud
http://csis.pace.edu/
August 24-26, 2015, New York, USA
******************************
Important Dates
Paper submission due: May 1, 2015
Acceptance notification: June 15, 2015
Camera-ready due: July 15, 2015
Author registration: July 20. 2015
Conference: Aug. 24-26, 2015
Scope and Topics of Interest
The emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. Researchers and practitioners have embraced cloud computing as a new approach that has the potential for a profound impact in our daily life and world economy.
About 40% data globally would be related to cloud computing by 2020, as estimated by IDC. The large volume of data has big complexity and variety. To avoid system fragility and defend against vulnerabilities exploration from cyber attacker, various security techniques and tools have been developed for Big Data on cloud. There are two important aspects of Big Data Security, especially in cloud computing environment. One is how to protect big data, the other is how to using big data analytic technique to enhance security of the whole system.
The objective of BigDataSecurity 2015 is to provide a forum for scientists, engineers, and researchers to discuss and exchange their new ideas, novel results, work in progress and experience on all aspects of Big Data Security on cloud. Topics of particular interest include, but are not limited to:
-Big data model in New Paradigms
-Big data security
-Big data privacy
-Big data storage, integration, service, mining
-Big data security applications, such as healthcare, transportation, environment, education, business, library, media, finance, etc.
-Cyber hacking, next generation fire wall
-Cyber monitoring, incident response
-Database security, data center security
-Social engineering, insider threats, advance spear phishing
-Cyber threat intelligence
-Security and fault tolerance for embedded or ubiquitous systems
-Tele-health security
-Sensor network security
-Security policy and legal considerations
-Cloud and networking security
-Cloud computing and networking models
-Virtualization for big data on cloud
-MapReduce with cloud for big data processing
-Heterogeneous architecture for cloud computing
-Dynamic resource sharing algorithm for cloud computing
-Load balance for cloud computing
-Mobile cloud computing
-Green cloud computing
-Embedded networks and sensor network optimizations
-Cyber Security in emergent technologies, infrastructures and applications
PAPER SUBMISSION AND PUBLICATION
Submissions should include abstract, 5-10 keywords, and the e-mail address of the corresponding author and be in PDF format. Each submission must not exceed 6 pages in the IEEE 8.5’’ x 11’’ two-column format with 10-12 point font (Template: DOC or LaTeX), including tables and figures. Each accepted paper needs at least one author to register in the conference. Each submission should be regarded as an undertaking that, should the submission be accepted, at least one of the authors must attend the conference to present the work in order that the accepted paper can be put into digital library. The final version of an accepted paper will be limited to 10 pages in IEEE proceeding format. Please submit papers in PDF format through the BigDataSecurity web site. Manuscript should be prepared following the IEEE Computer Society Press Proceedings. Author Guidelines that can be found at: http://www.computer.org/
The accepted papers have to be presented orally at the conference and will be published by IEEE Computer Society Press (indexed by EI) and included in IEEE Digital Library. Selected best papers will be recommended to the special issues of well-regarded SCI journals..
******************************
ORGANIZING COMMITTEE
General Chair
Albert Zomaya, University of Sydney, Australia
Program Chair
Bhavani Thuraisingham, University of Texas at Dallas, USA
Yongxin Zhu, Shanghai Jiaotong University, China
Publication Chair
Bin Wang, Wright State University, USA
Publicity Chair
Jingtong Hu, Oklahoma State University, USA
Local Chair
Meikang Qiu, Pace University, USA
Web Chair
Keke Gai, Pace University, USA
Steering Committee
Albert Zomaya, University of Sydney, Australia
Bhavani Thuraisingham, University of Texas at Dallas, USA
Meikang Qiu, Pace University, USA
Yongxin Zhu, Shanghai Jiaotong University, China
No comments:
Post a Comment