+ADwAIQ-DOCTYPE HTML PUBLIC +ACI--//W3C//DTD HTML 4.01 Transitional//EN+ACIAPg- +ADw-HTML+AD4- +ADw-HEAD+AD4- +ADw-TITLE+AD4- +AFs-Tccc+AF0- Call for Chapters: Security, Privacy and Trust... +ADw-/TITLE+AD4- +ADw-LINK REL+AD0AIg-Index+ACI- HREF+AD0AIg-index.html+ACI- +AD4- +ADw-LINK REL+AD0AIg-made+ACI- HREF+AD0AIg-mailto:tccc+ACU-40?Subject+AD0-Re+ACU-3A+ACU-20+ACU-5BTccc+ACU-5D+ACU-20Call+ACU-20for+ACU-20Chapters+ACU-3A+ACU-20Security+ACU-2C+ACU-20Privacy+ACU-20and+ACU-20Trust...+ACY-In-Reply-To+AD0AJQ-3Cmailbox-6856-1375789673-886371+ACU-40CPS-PE406-30342.central.cmich.local+ACU-3E+ACIAPg- +ADw-META NAME+AD0AIg-robots+ACI- CONTENT+AD0AIg-index,nofollow+ACIAPg- +ADw-style type+AD0AIg-text/css+ACIAPg- pre +AHs- white-space: pre-wrap+ADs- /+ACo- css-2.1, curent FF, Opera, Safari +ACo-/ +AH0- +ADw-/style+AD4- +ADw-META http-equiv+AD0AIg-Content-Type+ACI- content+AD0AIg-text/html+ADs- charset+AD0-us-ascii+ACIAPg- +ADw-LINK REL+AD0AIg-Previous+ACI- HREF+AD0AIg-003791.html+ACIAPg- +ADw-LINK REL+AD0AIg-Next+ACI- HREF+AD0AIg-003793.html+ACIAPg- +ADw-/HEAD+AD4- +ADw-BODY BGCOLOR+AD0AIgAj-ffffff+ACIAPg- +ADw-H1+AD4AWw-Tccc+AF0- Call for Chapters: Security, Privacy and Trust...+ADw-/H1+AD4- +ADw-B+AD4-Mukaddim Pathan+ADw-/B+AD4- +ADw-A HREF+AD0AIg-mailto:tccc+ACU-40?Subject+AD0-Re+ACU-3A+ACU-20+ACU-5BTccc+ACU-5D+ACU-20Call+ACU-20for+ACU-20Chapters+ACU-3A+ACU-20Security+ACU-2C+ACU-20Privacy+ACU-20and+ACU-20Trust...+ACY-In-Reply-To+AD0AJQ-3Cmailbox-6856-1375789673-886371+ACU-40CPS-PE406-30342.central.cmich.local+ACU-3E+ACI- TITLE+AD0AIgBb-Tccc+AF0- Call for Chapters: Security, Privacy and Trust...+ACIAPg-al+AF8-mukaddimatyahoo.com.au +ADw-/A+AD4APA-BR+AD4- +ADw-I+AD4-Fri Sep 14 08:23:12 EDT 2012+ADw-/I+AD4- +ADw-P+AD4APA-UL+AD4- +ADw-LI+AD4-Previous message: +ADw-A HREF+AD0AIg-003791.html+ACIAPgBb-Tccc+AF0- IEEE ICC 2013: Green Communication Systems and... +ADw-/A+AD4APA-/li+AD4- +ADw-LI+AD4-Next message: +ADw-A HREF+AD0AIg-003793.html+ACIAPgBb-Tccc+AF0- Demo CFP: WUWNet'12 - The 7th ACM International Conference on Underwater Networks and Systems +ADw-/A+AD4APA-/li+AD4- +ADw-LI+AD4- +ADw-B+AD4-Messages sorted by:+ADw-/B+AD4- +ADw-a href+AD0AIg-date.html+ACM-3792+ACIAPgBb- date +AF0APA-/a+AD4- +ADw-a href+AD0AIg-thread.html+ACM-3792+ACIAPgBb- thread +AF0APA-/a+AD4- +ADw-a href+AD0AIg-subject.html+ACM-3792+ACIAPgBb- subject +AF0APA-/a+AD4- +ADw-a href+AD0AIg-author.html+ACM-3792+ACIAPgBb- author +AF0APA-/a+AD4- +ADw-/LI+AD4- +ADw-/UL+AD4- +ADw-HR+AD4- +ADwAIQ---beginarticle--+AD4- +ADw-PRE+AD4- Dear Colleagues, Please consider contributing to the book: Security, Privacy and Trust in Cloud Systems, to be published by Springer, USA. The call for book chapter can be found later in this email. Interested contributors are requested to visit the book website (+ADw-A HREF+AD0AIg-http://www.cloudserviceresearch.com/security-book+ACIAPg-http://www.cloudserviceresearch.com/security-book+ADw-/A+AD4-) and check the tentative table of contents before submitting a chapter proposal. Best regards, Surya Nepal, CSIRO ICT Centre, Australia Mukaddim Pathan, Telstra Corporation Limited, Australia +ACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACo- Security, Privacy and Trust in Cloud Systems Dr. Surya Nepal, CSIRO ICT Centre, Australia Dr. Mukaddim Pathan, Telstra Corporation Limited, Australia Publisher: Springer, New York, USA +ACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACoAKgAqACo- Introduction +AD0APQA9AD0APQA9AD0APQA9AD0APQA9- Cloud computing provides a new paradigm to enable on-demand delivery of computing resources such as infrastructure, platform, and software to customers as utilities. Despite what cloud computing promises, it is not secure by nature. Commercial enterprises often do not want to store their data in the cloud due to the lack of trust and the risk of exposing their data in an untrusted environment. The data in the cloud must be properly encrypted both in motion and at rest. This calls for hybrid cloud environments, where part of the application/data is hosted in a public cloud and commercial sensitive data is hosted on premises. In this context, a key challenge is the provisioning of a secure and trusted application/data that can be operated in a hybrid cloud environment. This book aims at compiling technologies for enhancing and provisioning security, privacy and trust in Cloud systems based on QoS requirements. Book Website +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0- URL: +ADw-A HREF+AD0AIg-http://www.cloudserviceresearch.com/security-book+ACIAPg-http://www.cloudserviceresearch.com/security-book+ADw-/A+AD4- Email: +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-cloudsec2... at easychair.org+ADw-/A+AD4- Objectives +AD0APQA9AD0APQA9AD0APQA9AD0- This book will be a timely contribution to a field that is gaining considerable research interest, momentum, and is expected to be of increasing interest to academic researchers and commercial developers. It will provide a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, it will offer: - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - A few special features, including: +ACo- Case studies written by professionals and/or industrial researchers. +ACo- Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. +ACo- Identification of open research issues to help practitioners and researchers. Topics of Interest +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0- Topics for potential chapters include, but are not limited to: +ACo- Cloud Computing Fundamentals +ACo- Secure information sharing and data protection in the cloud +ACo- Intra and inter-cloud security, privacy and trust +ACo- Cloud-based eGovernance +ACo- Cloud security architecture and protocol +ACo- Autonomic security in cloud systems +ACo- Cryptography and crypto-protocols for cloud systems +ACo- QoS-based trust model and QoS monitoring mechanism +ACo- Enterprise cloud security case study +ACo- Open research issues in cloud security and future roadmap Important Dates +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9- Chapter Proposal Due: October 15, 2012 (You are invited to submit a 1-2 pages proposal describing the topic of your chapter. The proposal should include the chapter organization, anticipated number of pages of the final manuscript and brief biography of authors. Early submission is highly appreciated) Notification of Proposal Acceptance/Rejection: November 1, 2012 Full Chapter Due: January 05, 2013 Notification of Chapter Acceptance/Rejection: February 05, 2013 Final Chapter Due: March 15, 2013 Manuscript Delivery to Publisher: March 31, 2013 Target Audience +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0- The theme of the proposed book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: - Learn the state-of-the-art in research and development on cloud security, privacy and trust. - Obtain a future roadmap by learning open research issues. - Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems. - Use the book as a valuable reference for a technical professional in a related industry. - Use the book as a text book in the graduate and postgraduate level to prepare students who intend to perform research in the field or intend to be employed in a related industry. Submission Instructions +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQ- Proposal Submission: Proposal should not exceed three A4 pages and must include title, authors, chapter organization and proposed content in each section. Proposals should be submitted using the EasyChair Submission System (+ADw-A HREF+AD0AIg-https://www.easychair.org/conferences/?conf+AD0-cloudsec2013+ACIAPg-https://www.easychair.org/conferences/?conf+AD0-cloudsec2013+ADw-/A+AD4-) or by email to the editors. Final manuscript submission: Each accepted chapter must not exceed 25 A4 pages. Please use at least 11 point Times New Roman fonts, with single spacing and 1-inch margin at top-bottom-left-right of the page. Please note that there is no specific template for the chapter as the publisher would like to receive structured text without any specific layout. This is to allow the book to be available electronically to all future devices, including IPad, Kindle etc. Typesetting and data preparation will be done by the publisher. We expect to receive significant, high quality, and innovative contributions that are not yet fully published (at least 30+ACU- new content) or that are not currently under review elsewhere. To make the book accessible to larger audience, contributions from the authors can also be based on the concepts learned from previously published works. The book is intended to be used as graduate level courseware. Therefore, each chapter should be written as tutorial type, rather than as a conference paper. Each chapter should include the following mandatory sections (with exact heading) among others of choice of the authors: keywords (at least 5, not more than 10), introduction, background/related work, visionary thoughts for practitioners, future research directions, conclusion, and references. Submission of a chapter for review would imply the readiness of the author(s) to publish the chapter in the book. Early submission is highly appreciated as the editors would like to have progressive dialogue and work with prospective authors to bring out a book of wide appeal. Authors of accepted chapters would be required to sign an agreement of copyright transfer and an originality statement to the publisher. Editors Contact Details +AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9- Dr. Surya Nepal Principal Research Scientist CSIRO ICT Centre Cnr Vimiera and Pembroke Roads Marsfield, NSW 2122, Australia Email: +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-surya.ne... at csiro.au+ADw-/A+AD4- Dr. Mukaddim Pathan Technology Specialist - Content Delivery Networks Telstra Corporation Limited 21/35 Collins St, Melbourne, Victoria 3000, Australia Email: +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-mukaddim.pat... at team.telstra.com+ADw-/A+AD4AOw- +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-al.mukad... at gmail.com+ADw-/A+AD4- -- --------------------------------------------------------- Dr. Mukaddim Pathan Technology Specialist - Content Delivery Networks Telstra Corporation Limited 21/35 Collins St, Melbourne, VIC 3000, Australia Contact: 3-8647 9662 (Office) E-mail: +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-mukaddim.pat... at team.telstra.com+ADw-/A+AD4- Web: +ADw-A HREF+AD0AIg-http://cecs.anu.edu.au/+AH4-mukaddim.pathan+ACIAPg-http://cecs.anu.edu.au/+AH4-mukaddim.pathan+ADw-/A+AD4- +AF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXw- IEEE Communications Society Tech. Committee on Computer Communications (TCCC) - for discussions on computer networking and communication. +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-Tccc at lists.cs.columbia.edu+ADw-/A+AD4- +ADw-A HREF+AD0AIg-https://lists.cs.columbia.edu/cucslists/listinfo/tccc+ACIAPg-https://lists.cs.columbia.edu/cucslists/listinfo/tccc+ADw-/A+AD4- +ADw-/PRE+AD4- +ADwAIQ---endarticle--+AD4- +ADw-HR+AD4- +ADw-P+AD4APA-UL+AD4- +ADwAIQ---threads--+AD4- +ADw-LI+AD4-Previous message: +ADw-A HREF+AD0AIg-003791.html+ACIAPgBb-Tccc+AF0- IEEE ICC 2013: Green Communication Systems and... +ADw-/A+AD4APA-/li+AD4- +ADw-LI+AD4-Next message: +ADw-A HREF+AD0AIg-003793.html+ACIAPgBb-Tccc+AF0- Demo CFP: WUWNet'12 - The 7th ACM International Conference on Underwater Networks and Systems +ADw-/A+AD4APA-/li+AD4- +ADw-LI+AD4- +ADw-B+AD4-Messages sorted by:+ADw-/B+AD4- +ADw-a href+AD0AIg-date.html+ACM-3792+ACIAPgBb- date +AF0APA-/a+AD4- +ADw-a href+AD0AIg-thread.html+ACM-3792+ACIAPgBb- thread +AF0APA-/a+AD4- +ADw-a href+AD0AIg-subject.html+ACM-3792+ACIAPgBb- subject +AF0APA-/a+AD4- +ADw-a href+AD0AIg-author.html+ACM-3792+ACIAPgBb- author +AF0APA-/a+AD4- +ADw-/LI+AD4- +ADw-/UL+AD4- +ADw-hr+AD4- +ADw-a href+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-More information about the TCCC mailing list+ADw-/a+AD4APA-br+AD4- +ADw-/body+AD4APA-/html+AD4-