Workshop on Security and Privacy in Cloud-based Applications

to be held in conjunction with the ARES EU Projects Symposium 2015, held at the 10th International Conference on Availability, Reliability and Security(ARES 2015 – http://www.ares-conference.eu)

August 24-28, 2015
Université Paul Sabatier
Toulouse, France

Cloud services and cloud-based applications have become increasingly popular in the recent years. Security and privacy of the cloud-based applications have always been major roadblock for wide use of cloud services that involve sensitive data. Therefore this research field attracts a lot of attention from the academia and industry. The aim of the workshop is to provide the environment to exchange ideas and to foster discussions on a broad list of aspects related to privacy and security of cloud-based applications, and to find answers to questions like: How do we design authentication and authorization frameworks for cross-cloud environments, supporting different identity/attribute providers and organizational policies while guaranteeing privacy, security and trust? How can we extend current solutions with higher assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption techniques to address specific security and confidentiality requirements of large distributed infrastructures? What is the best way to validate practical aspects of the cloud-based applications, such as scalability, efficiency, maturity and usability?

Next to regular sessions with research papers, the workshop will include an invited talk as well as a round table on “Evolution of privacy-preserving authentication and authorization tools: from concepts to deployment“, presenting the results of the FP7 AU2EU project (http://www.au2eu.eu/).

Topics of interest comprise but are not limited to:
Privacy-preserving Authentication
Attribute-based Authorization
Integrated Authentication and Authorization
Assurance of Claims
Crypto-based Policy Enforcement
Attribute-based Encryption
Secure Data Management
Key Management
Trust Management
Operations under Encryption
Homomorphic Encryption
Searchable Encryption
Privacy-Preserving Data Mining
Security as a Service
Big Data Security
Important Dates
Submission Deadline April 1, 2015 May 8, 2015
Author Notification June 1, 2015
Proceedings Version June 15, 2015
Conference August 24-28, 2015
Workshop Chairs

Milan Petkovic (General Chair)
Philips Research / Eindhoven University of Technology – Netherlands
milan.petkovic[at]philips.com

Jan Camenisch (Program Co-Chair)
IBM Research – Zurich, Switzerland
jca[at]zurich.ibm.com

John Zic (Program Co-Chair)
CSIRO – Sydney, Australia
john.zic[at]csiro.au

Alexandru Egner (Organization Co-Chair)
Eindhoven University of Technology – Netherlands
a.i.egner [at]tue.nl

Program Committee

Giuseppe Ateniese, Sapienza University of Rome, Italy
George Danezis, University College London, UK
Refik Molva, EURECOM, France
Gerrit Bleumer, Scheidt & Bachmann, Germany
Ljiljana Brankovic, University of Newcastle, Australia
Jeroen Doumen, Irdeto, The Netherlands
Csilla Farkas, University of South Carolina, USA
Pietro Colombo, University of Insubria, Italy
Simone Fischer-Hubner, Karlstad University, Sweden
Dieter Gollmann, Hamburg University of Technology, Germany
Tanya Ignatenko, Eindhoven University of Technology, Netherlands
Mizuho Iwaihara, Waseda University, Japan
Sushil Jajodia, George Mason University, USA
Nguyen Manh Tho, Vienna University of Technology, Austria
Guenther Pernul, University of Regensburg, Germany
Bart Preneel, KU Leuven, Belgium
Kai Rannenberg, Goethe University Frankfurt, Germany
Ahmad-Reza Sadeghi, Darmstadt University, Germany
Andreas Schaad, Huawei Research
Yuan Zhang, State University of New York at Buffalo, USA
Sabrina De Capitani di Vimercati, University of Milan, Italy

Submission

The proceedings of ARES (including workshops) have been published by Conference Publishing Services (CPS). The submission guidelines valid for the AU2EU workshop are the same as for the ARES conference. They can be found >>here<<.

 

Leave a reply