Listing 1 - 3 of 3 |
Sort by
|
Choose an application
It is our great pleasure to welcome you to the 11th anniversary of the ACM Cloud Computing Security Workshop. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing including:Side channel attacksPractical cryptographic protocols for cloud securitySecure cloud resource virtualization mechanismsSecure data management outsourcing (e.g., database as a service)Practical privacy and integrity mechanisms for outsourcingFoundations of cloud-centric threat modelsSecure computation outsourcingRemote attestation mechanisms in cloudsSandboxing and VM-based enforcementsTrust and policy management in cloudsSecure identity management mechanismsNew cloud-aware web service security paradigms and mechanismsCloud-centric regulatory compliance issues and mechanismsBusiness and security risk models and cloudsCost and usability models and their interaction with security in cloudsScalability of security in global-size cloudsTrusted computing technology and cloudsBinary analysis of software for remote attestation and cloud protectionNetwork security (DOS, IDS etc.) mechanisms for cloud contextsSecurity for emerging cloud programming modelsEnergy/cost/efficiency of security in cloudsMachine learning for cloud protection CCSW especially encourages novel paradigms and controversial ideas that are not on the above list. The workshop has historically acted as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.
Choose an application
It is our great pleasure to welcome you to the 12th anniversary of the ACM Cloud Computing Security Workshop. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing including:Side channel attacks, Practical cryptographic protocols for cloud security, Secure cloud resource virtualization mechanisms, Secure data management outsourcing (e.g., database as a service), Practical privacy and integrity mechanisms for outsourcing, Foundations of cloud-centric threat models, Secure computation outsourcing, Remote attestation mechanisms in clouds, Sandboxing and VM-based enforcements, Trust and policy management in clouds, Secure identity management mechanisms, New cloud-aware web service security paradigms and mechanisms, Cloud-centric regulatory compliance issues and mechanisms, Business and security risk models and clouds, Cost and usability models and their interaction with security in clouds, Scalability of security in global-size clouds, Trusted computing technology and clouds, Binary analysis of software for remote attestation and cloud protection, Network security (DOS, IDS etc.) mechanisms for cloud contexts, Security for emerging cloud programming models, Energy/cost/efficiency of security in clouds, Machine learning for cloud protection.
Choose an application
Cloud services have revolutionized modern computing, with the most obvious benefits including scalability, increased availability, and the potential for reduced costs. However, the benefits of outsourcing data and computation come with security and privacy concerns.
Listing 1 - 3 of 3 |
Sort by
|