The explosion in interest towards cloud computing architectures is fuelled by tangible savings in power consumption, higher resource utilisation, and abstraction of platforms from technical infrastructure, scalability and business models of ‘computing as a utility’.
However, it is evident that our existing understanding of distributed computing is already tested by new and exciting use cases such as the private and secure use of public cloud resources.
The aim of this special issue is to explore emerging trends in secure, transparent use of cloud computing for business and research activities. Articles that explore theoretical and empirical research are appropriate, and industrial case studies contextualised in the research literature are particularly welcome.
Suitable topics include but are not limited to:
- Trusted cloud computing architecture
- Trusted cloud computing operating systems
- Trusted virtualisation technologies
- Trusted cloud applications
- Distributed trust mechanisms
- Provenance mechanisms
- Workflow provenance in cloud computing
- Cloud security and privacy models
- Security as a service
- Provenance as a service
- Encryption techniques
- Authentication techniques
Submission of paper: 1 November, 2012
First round review reports and decision: 30 December, 2012
Second round of review reports and final decision: 30 January, 2013
Final paper deadline: 25 February, 2013
No comments:
Post a Comment