会议信息
ICCCS' 2018: International Conference on Cloud Computing and Security
登录查看会议网址

截稿日期:
2018-03-25
通知日期:
2018-04-20
会议日期:
2018-06-08
会议地点:
Haikou, China
届数:
4
浏览: 19289   关注: 6   参加: 5

征稿
Cloud computing has emerged as today's most exciting computing paradigm for deploying, managing and offering services by a shared infrastructure, which opens a new door for resolving the conflicts between the explosive growth of digital resource demands and large outlays. However, cloud computing also raises many research challenges, such as research management, data security, privacy, trusted computing.

The International Conference on Cloud Computing and Security (ICCCS2018), which is to be held on June 8-10, 2018, aims to address the above challenges. It is targeted to provide an international forum for scientists, researchers, and industrial practitioners to discuss and exchange their new ideas, novel results, work in progress and experience on all issues of cloud computing and security.

1. Cloud Computing
Cloud Computing Architecture and Systems
Cloud Computing Models, Simulations, Designs, and Paradigms
Cloud Management and Operations
Dynamic Resource Provision and Consuming
Cloud Computing Technologies, Services and Applications
2. Cloud Security
Security Evaluation and Benchmarks Based on Cloud
Security Policy, Security Theory and Models Based on Big Data
Authentication, Authorization and Reliability Issues in Cloud
Security and Privacy in Cloud Computing
Information Security and Risks Management
Machine Learning for Security
3. Information Hiding
Coverless Information Hiding
Steganography and Steganalysis
Digital Watermarking, Fingerprinting and Forensics
Multimedia Authentication and Encryption
Covert/Subliminal Channels
4. IoT Security
Data Security and Privacy in the IoT
Attacks and Countermeasures on IoT Systems
Trust Model, Data Aggregation and Information Sharing
Secure Hardware and Software for IoT
Application Security for IoT
5. Multimedia Forensics
Active and Passive Forensics
Big Data Forensics
Portable electronic device forensics
Network Forensics
Anti-forensics
6. Encryption
Measurements for Cybersecurity
Post Quantum Cybersecurity
Visualization for Security
Applied Cryptography
Language-based Security

Publication

Outstanding papers will be invited for possible publication in the following SCI-indexed journals:
Ad hoc networks
Computers, Materials & Continua
Computer Modeling in Engineering & Sciences
EURASIP Journal on Wireless Communications and Networking
IEEE Access
IETE Technical Review
International Journal of Sensor Networks
Journal of Internet Technology
Journal of network and computer applications
Multimedia Tools and Applications
Neurocomputing
Neural Computing and Applications
Sensors
Soft Computing
Wireless Communications and Mobile Computing
World Wide Web

All the accepted papers will be published as a post-proceedings in Springer-Verlag's Lecture Notes in Computer Science (LNCS) series and indexed by EI.
最后更新 Dou Sun 在 2018-03-11
相关会议
CCFCOREQUALIS简称全称截稿日期通知日期会议日期
bSOCCACM Symposium on Cloud Computing2026-07-072026-09-262026-11-18
cb2CloudComInternational Conference on Cloud Computing Technology and Science2026-06-152026-09-072026-10-27
aa*a1CCSACM Conference on Computer and Communications Security2026-04-222026-07-172026-11-15
aa*a1MobiComInternational Conference on Mobile Computing and Networking2026-03-062026-06-222026-10-26
cbb1AsiaCCSACM ASIA Conference on Computer and Communications Security2025-12-122026-03-102026-06-01
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
cbb1ICICSInternational Conference on Information and Communications Security2025-05-232025-07-212025-10-29
cbb2IEEE CLOUDIEEE International Conference on Cloud Computing2023-03-252023-05-082023-07-02
cb3CISInternational Conference on Computational Intelligence and Security2020-08-052020-08-312020-11-27
cb2GCCInternational Conference on Grid and Cloud Computing2010-08-102010-11-01
相关期刊
CCF全称影响因子出版商ISSN
ACM Computing Surveys28.0ACM0360-0300
bComputers & Security5.4Elsevier0167-4048
cIEEE Transactions on Cloud Computing5.0IEEE2168-7161
Cluster Computing4.1Springer1386-7857
International Journal of Information Security3.2Springer1615-5262
Computer Law & Security Review3.2Elsevier0267-3649
cJournal of Grid Computing2.9Springer1570-7873
cSoft Computing2.5Springer1432-7643
cIET Information Security1.300IET1751-8709
cTheory of Computing Systems0.4Springer1432-4350