Cloud computing is a major research area. Much of the discussion is due to the security issues it poses as a new technology and to the IT paradigm shift, as well as the fact that increasing cybersecurity concerns have a direct impact on the cloud. Issues span from fundamental confidentiality assurance of data in rest and motion, due to data outsourcing, to regulation and jurisdiction problems of legal data ownership and takeover. The virtualization technology that supports the building blocks for multi-tenant infrastructures also poses novel security risks and vulnerabilities that need to be properly addressed. Ironically, the interplay of these new technologies paves the way for the development of novel defenses against the very threats that arise in the current attack landscape. For example, virtual machine escape vulnerabilities are specific to virtualization technology, the same one that simplifies dynamic malware analysis.
Cloud computing research is a multidisciplinary effort involving cryptography, networking, software development, system architecture, among others. This workshop aims to attract innovative research works and foster discussions addressing technical, policy and legal issues of information security, assurance and reliability in cloud computing environments, elaborating on distinguished and emerging topics that are of interest to both the academia and the industry.
Information on the previous edition of WISARC can be found in here.
The Technical Program Committee of WISARC 2016 invites researchers and practitioners to prepare high-quality submissions describing unpublished theoretical or practical research related with, but not limited to, the following topics:
* Architecture security of web services and web protocols;
* Assurance of data sanitization in the Cloud;
* Auditability of cloud systems;
* Big data and log analysis;
* Cloud and BYOD integration security;
* Cloud availability and resources starvation;
* Cloud computing cybercriminality, APTs and cybersecurity;
* Cloud-focused attacks;
* Cloud forensics;
* Cryptography for the Cloud;
* Cryptography in trust models and trusted computing technology;
* Cybercriminality, APTs and cybersecurity leveraging the Cloud;
* Enforcement of security in hybrid clouds;
* Interclouds security;
* Modern malware analysis;
* Multi-factor auth (authentication and authorization);
* Network perimeter security, monitoring and SIEM in the cloud for incident response;
* Network steganography;
* Privacy and anonymization in cloud systems;
* Reliable and privacy-preserving outsourced storage and distributed computing;
* Secure (federated) identity management and SSO architectures;
* Secure and reliable cloud programming models;
* Secure generation and management of cryptography secrets in VMs;
* Security issues in software-defined networks;
* Security of open-source cloud software;
* Trust and policy management in cloud systems;
* Virtualization and sandbox security and VM isolation assurance.
Paper submission due: July 30, 2016 (UTC midnight)
Notification of acceptance: August 30, 2016
Camera Ready and author registration: September 21, 2016
Workshop: December 6-9, 2016
Manuscripts submitted to this workshop should be structured as technical papers and may not exceed six (6) single-spaced double-column pages using 10-point
size font on 8.5x11 inch pages using the IEEE conference style. The page limit includes title, abstract, figures and references. Submissions
exceeding the page limit will not be reviewed. Manuscripts must be received by August 22, 2016.
Submissions must be in PDF format and issued via EasyChair by following the link:
All manuscripts will be reviewed by the Technical Program Committee and evaluated on originality, relevance of the problem to the workshop theme, technical strength, rigor in analysis, quality of results, and organization and clarity of the presentation. Submitted papers must represent original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conferences. Authors may contact the Program Chairs using the the email addresses included below for further information or clarification.
Notification of review decisions will be mailed by August 21, 2016. Camera-ready papers are due by September 21, 2016. Published proceedings will be available at the conference. At least one author of each paper must be registered for the conference in order for the paper to be published in the proceedings. Presentation of an accepted paper at the workshop is a requirement for publication also. There is no student rate for the author responsible for the registration of his/her published paper. In case of having more than one accepted paper, authors have to register for each one individually. There is no discount associated with having more than one paper accepted.
Damien Magoni, University of Bordeaux, France
Danilo Gligoroski, Norwegian University of Science and Technology, Norway
Giampaolo Bella, University of Catania, Italy
Henrique Santos, University of Minho, Portugal
Hugues Mercier, University of Neuchatel, Switzerland
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Mário M. Freire, University of Beira Interior, Portugal
Mauro Conti, University of Padua, Italy
Miguel P. Correia, University of Lisbon, Portugal
(M.) Reza Memarian, University of Turku, Finland
Rui Miguel Silva, Polytechnic Institute of Beja, Portugal
Shujun Li, University of Surrey, United Kingdom
Simona Bernardi, Centro Universitario de la Defensa, Zaragoza, Spain
Vesselin Velichkov, University of Luxembourg, Luxembourg
Ville Leppänen,University of Turku, Finland