Download - Pace University

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Intelligent maintenance system wikipedia , lookup

Transcript
CALL FOR PAPERS
The IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity 2015)
Aug. 24-26, 2015, New York, USA
http://csis.pace.edu/BigDataSecurity
General Chair
Albert Zomaya, University of Sydney, Australia
Meikang Qiu, Pace University, USA
Program Chair
Bhavani Thuraisingham, University of Texas at Dallas, USA





Hongjun Dai, Shandong University, China
Shui Yu, Deakin University, Australia
Publication Chair
Bin Wang, Wright State University, USA
Publicity Chair
Jingtong Hu, Oklahoma State University, USA
Local Chair
Peng Zhang, SUNY Stony Brook, USA
Web Chair
Keke Gai, Pace University, USA
Steering Committee
Albert Zomaya, University of Sydney, Australia
Bhavani Thuraisingham, University of Texas at Dallas, USA
Meikang Qiu, Pace University, USA
Yongxin Zhu, Shanghai Jiaotong University, China
Program Committee
Yongxin Zhu, Shanghai Jiaotong University, China
Zongming Fei, University of Kentucky, USA
Bin Wang, Wright State University, USA
Che-Lun Hung, Providence University
Yikui Zhang, Tianjin University, China
Jiahai Yang, Tsinghua Univesity, China
Jidong Zhai, Tsinghua University, China
Jun Wu, National Pingtung University
Zhihui Du, Tsinghua University, China
Weizhong Qiang, HUST, China
Ruixuan Li, HUST, China
Guangming Tan, Chinese Academy of Sciences, China
Li Bo, Beihang University, China
Zonghua Gu, Zhejiang University, China
Osman Khalid, COMSATS, Abbottabad
Hui Liu, University of Calgary, Canada
Scope and Topics of Interest
The emerging paradigm of cloud computing provides a new way to address
the constraints of limited energy, capabilities, and resources. Researchers
and practitioners have embraced cloud computing as a new approach that
has the potential for a profound impact in our daily life and world economy.
About 40% data globally would be related to cloud computing by 2020, as
estimated by IDC. The large volume of data has big complexity and variety.
To avoid system fragility and defend against vulnerabilities exploration
from cyber attacker, various security techniques and tools have been
developed for Big Data on cloud. There are two important aspects of Big
Data Security, especially in cloud computing environment. One is how to
protect big data, the other is how to using big data analytic technique to
enhance security of the whole system.
The objective of BigDataSecurity 2015 is to provide a forum for scientists,
engineers, and researchers to discuss and exchange their new ideas, novel
results, work in progress and experience on all aspects of Big Data Security
on cloud. Topics of particular interest include, but are not limited to:





















Big data model in New Paradigms
Big data security
Big data privacy
Big data storage, integration, service, mining
Big data security applications, such as healthcare, transportation,
environment, education, business, library, media, finance, etc.
Cyber hacking, next generation fire wall
Cyber monitoring, incident response
Database security, data center security
Social engineering, insider threats, advance spear phishing
Cyber threat intelligence
Security and fault tolerance for embedded or ubiquitous systems
Tele-health security
Sensor network security
Security policy and legal considerations
Cloud and networking security
Cloud computing and networking models
Virtualization for big data on cloud
MapReduce with cloud for big data processing
Heterogeneous architecture for cloud computing
Dynamic resource sharing algorithm for cloud computing
Load balance for cloud computing
Mobile cloud computing
Mobile commerce security and privacy
Green cloud computing
Embedded networks and sensor network optimizations
Cyber Security in emergent technologies
Important Dates
Paper submission due
Acceptance notification
Camera-ready due
Author registration
Conference
: June 6, 2015
: June 15, 2015
: July 15, 2015
: July 15. 2015
: Aug. 24-26, 2015
Submission Information
Submitted manuscripts should be written in English conforming to the IEEE
conference proceedings format (8.5" x 11", Two-Column, template
available at
https://www.ieee.org/conferences_events/conferences/publishing/templates.
html). Full Papers (up to 6 pages complimentary, or 12 pages with the over
length charge), Short Papers (up to 4 pages complimentary, or 6 pages with
the over length charge), and Posters (up to 1 page complimentary, or 2
pages with the over length charge) are solicited. See Instructions for authors.
All paper submissions must represent original and unpublished work.
Papers must be submitted electronically in PDF format through EasyChair
(https:/easychair.org/conferences/?conf=bigdatasecurity2015).
The accepted papers from this conference will be published by IEEE
Computer Society in IEEE proceedings (indexed by EI Compendex).
Distinguished papers, after further revisions, will be considered for possible
publication in several SCI & EI indexed special issues of prestigious
international journals. By submitting a paper to the conference, authors
assure that if the paper is accepted, at least one author will attend the
conference and present the paper.
The submission website for BigDataSecurity 2015
(https:/easychair.org/conferences/?conf=bigdatasecurity2015)
is
HERE