allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

The 8th International ACM Conference on Management of Digital EcoSystems

google+
Views: 630                 

When :  2016-11-01

Where :  Hendaye, France

Submission Deadline :  2016-07-20

Categories :   Cloud Computing ,  Software Engineering & Security      

MEDES 2016 : The 8th International ACM Conference on Management of Digital EcoSystems (MEDES'16)

November 1, 2016 - November 4, 2016

Hendaye, France

Call For Papers

The digital revolution and the migration to cloud computing technology seems inevitable, information has become one of the main assets of the institution, provided to should be mastered, that is to say, collected, validated, stored , secured, easily accessible for only the concerned persons, processed and aggregated for informed decision-making. Protecting this information is the main institutional concerns. It is an issue in itself, because of the structured and unstructured data growing, and strengthening regulatory constraints. The specific context of the cloud; where data is hosted outside the institution, exacerbated this concern. Moreover, the institutions experience feedback shows that the existing current cloud do not provide a satisfactory level of security to protect the confidential or personal data.

For this purpose, migrating to cloud computing require a rigorous approach to risk management of technical, contractual and legal security. Indeed, the institution intends to use a cloud service provider should ensure that it is able to implement appropriate security measures to be safe against risks specific to the cloud, related to traditional computer processing and those particularly relevant to the protection of personal data. We can cite the main risks identified in this regard as: the technological dependence regarding the cloud computing supplier, for example, the risk of losing data when migrating to another provider or when implementing an internal solution; a gap in data isolation, that is to say, the risk that the data hosted on a system (virtualized) are no longer isolated and can be modified or made accessible to unauthorized third parties, following a failure or poor management of the provider; the non-compliance of the conservation rules and destruction of data issued by the institution as an ineffective destruction or unsecure data; the access rights management issues; etc.

This track will focus on proposing new solutions and alternatives to protect and secure data through a public cloud computing. The objective is to target researchers interested in all aspects of protection techniques to ensure high information security and privacy. We are also interested in applications and case studies of data security in different practical domains. This track will be of interest to researchers and leading edge practitioners in academia, industry, and government agencies concerned with computer and network security.

Topics

  • Copyright and ownership
  • The APT parasite
  • Integrity, confidentiality and authenticity
  • Lightweight security techniques
  • Vulnerability analysis and assessment
  • Attacks tracking
  • Data hiding, tamper detection and recovery techniques
  • Security of e- healthcare systems and applications
  • Steganography, watermarking, and forensic techniques in multimedia content processing
  • Encryption and Homomorphic approaches
  • Data breaches
  • Permanent data loss
  • Intelligent secure algorithms
  • Privacy and access control
  • Evidentiary aspects of digital forensics
  • DoS attacks
  • Hacked interfaces and APIs
  • Exploited system vulnerabilities
  • Shared technology, shared dangers
  • Malicious insiders
  • Cloud service abuses
  • Compromised credentials and broken authentication
  • Account hijacking
  • Inadequate diligence

IMPORTANT DATES

  • Paper submission: July 20, 2016
  •                        
  • Notification of acceptance:September 5, 2016
  •            
  • Final manuscripts due: September 25, 2016
  •                       

    User Name : janetsofia
    Posted on


    Related CFPs

    MLDA 2025   4th International Conference on Machine Learning, NLP and Data Mining
    SIUSAI 2025   2025 4th International Symposium on Intelligent Unmanned Systems and Artificial Intelligence (SIUSAI 2025)
    NLCA 2025   6th International Conference on Natural Language Computing Advances
    COMSCI 2025   4th International Conference on Computer Science and Information Technology (COMSCI 2025)

    All Rights Reserved @ Call for Papers - Conference & Journals