Conferences related to Cloud Computing

Back to Top

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)

The ICITST is an international refereed conference dedicated to the advancement of theory andpractical implementation of secured Internet transactions and to fostering discussions on information technology evolution.


2017 12th International Conference on Malicious and Unwanted Software (MALWARE)

The Focus of the conference this year is twofold - (1) Evolving threat landscape, and (2) innovative system defense approaches. The topics are described in the paragraphs below.Evolving threat landscape: The Malware Criminal EcoSystem has become a vibrant sector of the dark economy in recent years. Innovation in this ecosystem is rampant at all levels - from the discovery of new vulnerabilities, to the introduction of new deployment mechanisms. This division of labor in the Malware Ecosystem has accelerated the deployment of new threats which often are deployed by multiple entities across platforms (often sloppily), but which certainly meet the business objectives. Current security approaches are often ineffective, since attackers quickly field test prototype attacks that dodge current defenses.

  • 2016 11th International Conference on Malicious and Unwanted Software (MALWARE)

    The Focus of the conference this year is twofold - (1) Security architectures & reformulated solutions, and (2) The demise of traditional end-point protection. The topics are described in the paragraphs below.In the past, the security protection model that most organizations applied to protect their infrastructure was simply the "Everything but the Kitchen Sink" model—meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base., and on, and on.... In essence, this model simply amounted to the accumulation of security devices. Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed.Security products are no longer about single or even multiple independent security devices each providing close-as-we-can-get-to-perfect standalone protection. MALCON will explore alternative architectures and solutions.

  • 2015 10th International Conference on Malicious and Unwanted Software (MALWARE)

    The Malware 2015 conference has adopted as its main theme "The Fabric of Security: A billion Sensors but no serious threat analysis and decision support" in recognition of a major paradigm shift that will transformed the security industry in the next 10 years. The fundamental premise to be addressed at the conference is the difference between point security solutions, their contribution to the overall protection of an organization, and the lack of integration amongst many solutions. Manuscripts addressing both new architectural solutions to build a "Fabric of Security", reference implementations, as well as effectiveness measurement methodologies are welcomed.

  • 2014 9th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)

    The Malware 2014 conference has adopted as its main theme "The Malware Threat in the era of Unlimited Computing Power" in recognition of a major paradigm shift that has transformed the computer industry as a whole, and created major challenges to the Security Community in particular. Specifically, the scope of attacks being delivered in 2014 takes on a completely new magnitude when the attacker has at its disposal unlimited computing resources through the use of Cloud Based Services. Given such a threat, we in the Security industry have a pressing needs for solutions that can handle such a threat.

  • 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)

    The Malware 2013 conference has adopted as its main theme "Malware in the Era of Cloud Services and Mobile Endpoints" in recognition of a major paradigm shift that has transformed the computer industry as a whole, and created major challenges to the Security Community in particular.

  • 2012 7th International Conference on Malicious and Unwanted Software (MALWARE)

    This years conference will pay particular attention to (and will also be extensively discussed in several panel sessions) the pressing topic of Defending the Extended Network What happened to the walls As Smartphones become the preferred access device, while applications and data reside at multiple locations in the Cloud, the idea of protecting the network and the end-point (a Windows device) is no longer practical. A paradigm shift is upon us, and protecting both application and data in a world of billions of Smartphone devices is intriguing and challenging. Clearly, there is no longer a network to protect. Further, the concept of an extended network has significant limitations. In the new paradigm what is emerging is the concept a Trusted Domains with no physical boundaries. Thus, the organizers of Malware 2012 Asia Pacific solicit original written contributions addressing these issues and research questions. Manuscripts focusing on the security properties of Trusted Domains, Cloud Computing.

  • 2011 6th International Conference on Malicious and Unwanted Software (MALWARE)

    Malware 2011 is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

  • 2010 5th International Conference on Malicious and Unwanted Software (MALWARE)

    The 5th IEEE International Conference on Malicious and Unwanted Software is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

  • 2009 4th International Conference on Malicious and Unwanted Software (MALWARE)

    An ounce of prevention is worth a pound of cure . Arguably, many of the current solutions for fighting Malware fall within the cure category. However, efficacy of current solutions are in question. Malware 2009 will focus on preventative measures such as software white listing and tighter models of access control at the O/S level.

  • 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)

    The conference is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field malicious and unwanted software, the techniques, economics and legal issues behind their use, and the methods to detect and control them.


2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)

CCGrid is a successful series of conferences that serves as the major international forum for presenting and sharing recent research results and technological developments in the fields of Cluster, Cloud and Grid computing. The CCGrid symposium, which is sponsored by the IEEE Computer Society Technical Committee on Scalable Computing (TCSC) and the ACM, reaches out to both researchers and practitioners, and to both academia and industry. The conference features keynotes, technical presentations, posters, workshops, tutorials, as well as the SCALE challenge featuring live demonstrations. CCGrid 2017 will have a focus on important and immediate issues that are significantly influencing all aspects of cluster, cloud and grid computing. Topics of interest include, but are not limited to:Applications, Architecture and Networking,Data Centers,Programming Models and Runtimes,Performance Models and Evaluation,Scheduling and Resource ManagementHybrid clouds, Storage and IO, Security, Rel


2017 20th International Conference on Information Fusion (Fusion)

The International Conference on Information Fusion is a premier forum for the interchange of the latest research in information fusion and discussion of its impacts on our society. The conference brings together researchers and practitioners from industry and academia to report on the latest scientific and technical advances.


2017 IEEE 10th International Conference on Cloud Computing (CLOUD)

The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g., hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g., Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g., business process as a service).

  • 2018 IEEE 11th International Conference on Cloud Computing (CLOUD)

    The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g., hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g., Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g., business process as a service).

  • 2016 IEEE 8th International Conference on Cloud Computing (CLOUD)

    The goal of Cloud Computing is to share resources among the cloud service consumers, cloud partners, and cloud vendors in the cloud value chain. The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g., hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g., Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g., business process as a service).

  • 2015 IEEE 8th International Conference on Cloud Computing (CLOUD)

    Cloud Computing has become a scalable services consumption and delivery platform in the field of Services Computing. The technical foundations of Cloud Computing include Service-Oriented Architecture (SOA) and Virtualizations of hardware and software. The goal of Cloud Computing is to share resources among the cloud service consumers, cloud partners, and cloud vendors in the cloud value chain. The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g., hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g., Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g., business process as a service).

  • 2014 IEEE 7th International Conference on Cloud Computing (CLOUD)

    Cloud Computing has become a scalable services consumption and delivery platform in the field of Services Computing. The technical foundations of Cloud Computing include Service-Oriented Architecture (SOA) and Virtualizations of hardware and software. The goal of Cloud Computing is to share resources among the cloud service consumers, cloud partners, and cloud vendors in the cloud value chain. The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g. hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g. Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g. business process as a service).

  • 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)

    CLOUD 2013 is a premier international forum for researchers and practitioners to share modeling, developing, publishing, monitoring, managing, delivering XaaS (everything as a service) in the context of various types of cloud environments.

  • 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)

    Modeling, developing, publishing, monitoring, managing, delivering XaaS (everything as a service) in the context of various types of cloud environments.

  • 2011 IEEE 4th International Conference on Cloud Computing (CLOUD)

    Change we are leading is the theme of CLOUD 2011. The technical foundations of Cloud Computing include Service-Oriented Architecture (SOA) and Virtualizations of hardware and software.

  • 2010 IEEE International Conference on Cloud Computing (CLOUD)

    The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g. hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g. Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g. business process as a service).

  • 2009 IEEE International Conference on Cloud Computing (CLOUD)

    Infrastructure Cloud Software Cloud Application Cloud Business Cloud Service-Oriented Architecture in Cloud Computing Vituralization of Hardware Resources Virtualization of Software Resources Cloud Computing Consulting Methods Design Tool for Cloud Computing Maintenance and Management of Cloud Computing Cloud Computing Architecture Cloud Applications in Vertical Industries


More Conferences

Periodicals related to Cloud Computing

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


More Periodicals

Most published Xplore authors for Cloud Computing

Back to Top

Xplore Articles related to Cloud Computing

Back to Top

Creating e-portfolio in U-learning Environment: A Framework of Could-based e-portfolio Service

Tzu-Chi Yang; Tosti H. C. Chiang; Stephen Jen-Hwa Yang 2012 IEEE Seventh International Conference on Wireless, Mobile and Ubiquitous Technology in Education, 2012

The purpose of this paper is to provide a framework (CEP) of processing learning portfolios (e-portfolios, eP) based on ubiquitous learning activities. The cloud technology is employ to conduct context-aware u-learning environment and provide proper service through cloud platform as a service (PaaS) approaches. CEP was integrated into the course structure as an assistant tool to enhance learning outcomes. The ...


A Framework for Optimizing Resource Allocation in Clouds

Yeongho Choi; Yujin Lim 2015 3rd International Conference on Computer, Information and Application, 2015

Cloud computing is one of the latest computing techniques. Cloud providers provision computing resources into virtual machines and allocate them to cloud users. The cloud computing has purpose to maximize the performance such as provider revenue and customer utility. In this paper, to maximize the profit and resource utilization of the provider, we propose winner determination mechanism with considering of ...


Designing and Deploying a Scientific Computing Cloud Platform

Yong Zhao; Yanzhe Zhang; Wenhong Tian; Ruini Xue; Cui Lin 2012 ACM/IEEE 13th International Conference on Grid Computing, 2012

Scientific applications are growing rapidly in both data scale and processing complexity due to advances in science instrumentation and network technologies, where Cloud computing as an emerging computing paradigm can offer unprecedented scalability and resources on demand, and is getting more and more adoption in the science community. We present our early effort in designing and building CloudDragon, a scientific ...


QBLESS: A case for QoS-aware bufferless NoCs

Zhicheng Yao; Xiufeng Sui; Tianni Xu; Jiuyue Ma; Juan Fang; Sally A. McKee; Binzhang Fu; Yungang Bao 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 2014

Datacenters consolidate diverse applications to improve utilization. However when multiple applications are co-located on such platforms, contention for shared resources like Networks-on-Chip (NoCs) can degrade the performance of latency-critical online services (high-priority applications). Recently proposed bufferless NoCs have the advantages of requiring less area and power, but they pose challenges in quality-of-service (QoS) support, which usually relies on buffer-based virtual ...


Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures

Junaid Shuja; Saad Mustafa; Raja Wasim Ahmad; Sajjad A. Madani; Abdullah Gani; Muhammad Khurram Khan IEEE Access, 2017

Smartphones are computationally constrained compared to server devices due to their size and limited battery based power. Compute-intensive tasks are often offloaded from smartphones to high-performance computing opportunities provided by nearby high-end cloud and edge servers. ARM architectures dominate smartphones while x86 dominate server devices. The difference in architectures requires Dynamic Binary Translation (DBT) of compiled code migration which increases ...


More Xplore Articles

Educational Resources on Cloud Computing

Back to Top

eLearning

Creating e-portfolio in U-learning Environment: A Framework of Could-based e-portfolio Service

Tzu-Chi Yang; Tosti H. C. Chiang; Stephen Jen-Hwa Yang 2012 IEEE Seventh International Conference on Wireless, Mobile and Ubiquitous Technology in Education, 2012

The purpose of this paper is to provide a framework (CEP) of processing learning portfolios (e-portfolios, eP) based on ubiquitous learning activities. The cloud technology is employ to conduct context-aware u-learning environment and provide proper service through cloud platform as a service (PaaS) approaches. CEP was integrated into the course structure as an assistant tool to enhance learning outcomes. The ...


A Framework for Optimizing Resource Allocation in Clouds

Yeongho Choi; Yujin Lim 2015 3rd International Conference on Computer, Information and Application, 2015

Cloud computing is one of the latest computing techniques. Cloud providers provision computing resources into virtual machines and allocate them to cloud users. The cloud computing has purpose to maximize the performance such as provider revenue and customer utility. In this paper, to maximize the profit and resource utilization of the provider, we propose winner determination mechanism with considering of ...


Designing and Deploying a Scientific Computing Cloud Platform

Yong Zhao; Yanzhe Zhang; Wenhong Tian; Ruini Xue; Cui Lin 2012 ACM/IEEE 13th International Conference on Grid Computing, 2012

Scientific applications are growing rapidly in both data scale and processing complexity due to advances in science instrumentation and network technologies, where Cloud computing as an emerging computing paradigm can offer unprecedented scalability and resources on demand, and is getting more and more adoption in the science community. We present our early effort in designing and building CloudDragon, a scientific ...


QBLESS: A case for QoS-aware bufferless NoCs

Zhicheng Yao; Xiufeng Sui; Tianni Xu; Jiuyue Ma; Juan Fang; Sally A. McKee; Binzhang Fu; Yungang Bao 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 2014

Datacenters consolidate diverse applications to improve utilization. However when multiple applications are co-located on such platforms, contention for shared resources like Networks-on-Chip (NoCs) can degrade the performance of latency-critical online services (high-priority applications). Recently proposed bufferless NoCs have the advantages of requiring less area and power, but they pose challenges in quality-of-service (QoS) support, which usually relies on buffer-based virtual ...


Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures

Junaid Shuja; Saad Mustafa; Raja Wasim Ahmad; Sajjad A. Madani; Abdullah Gani; Muhammad Khurram Khan IEEE Access, 2017

Smartphones are computationally constrained compared to server devices due to their size and limited battery based power. Compute-intensive tasks are often offloaded from smartphones to high-performance computing opportunities provided by nearby high-end cloud and edge servers. ARM architectures dominate smartphones while x86 dominate server devices. The difference in architectures requires Dynamic Binary Translation (DBT) of compiled code migration which increases ...


More eLearning Resources

IEEE-USA E-Books

  • Cloud Network and I/O Virtualization

    As the demand for information technology (IT) increases, so do the challenges for IT organizations to do more with less. Cloud is an approach that provides a new mechanism to consume IT as services, addressing some of the challenges in IT organization. Hence, the infrastructure hosting cloud services needs to be virtualized. Cloud network is a key component of the cloud infrastructure, and can be virtualized via several techniques. This chapter discusses how key network and computer input/output virtualization techniques can be leveraged as key underpinnings of a cloud network. The key focus of this chapter is not only to discuss virtualization techniques, but also to review the use cases and benefits.

  • Transmission Networks

    The transmission lines form the base for practically all types of networks, transporting the contents of the user to the destination in the core part of the networks. Transmission can be built up, for example, by utilizing good old copper wires, or more advanced lines such as fiber optics, radio links, or via satellite connections. The transmission line capacity can be increased by utilizing the same physical channels for different users, and even for different systems. This is called multiplexing. It can be done in practice via frequency division multiplexing (FDM) and time division multiplexing (TDM). The commercial telecommunications transmission networks have been constructed by utilizing pulse code modulation (PCM). The Carrier Ethernet Transport (CET) technology is a modern concept to connect the radio access and core parts of different systems in a flexible way. Cloud computing refers to virtualization of resources, which can be computing capacity and hosting facilities.

  • Social Mobile Clouds

    This chapter introduces the social component of the mobile clouds, exploring different ways to foster cooperation among selfish users. Different forms of cooperation are introduced and compared with each other. One of the key elements of this chapter is the introduction of social rewards for being cooperative. This chapter also discusses the evolutive development of social and mobile networks, highlighting in particular how these networks are becoming increasingly dependent on each other.

  • C‐IoT Cloud‐Based Services and C‐IoT User Device Diversity

    This chapter addresses the emerging new wave of new devices and technologies such as wearable/mobile and cloud technology (local, public, and inter‐cloud), analytics, and social media as key building blocks of collaborative IoT distributed intelligence. The chapter provides description of cloud computing and introduces a series of innovative and collaborative services. Collaboration among applications can be done at the gateway layer or service layer. Broader picture can be formulated and greater insights can be generated for taking a better decision. The second part of this chapter focuses on IoT user diversity and introduces the need for a common platform for IoT application development and collaboration.This chapter also examines the collaborative IoT impact on our digital lives and businesses and some of the future challenges such as privacy and security.

  • Security Challenges for Cloud Radio Access Networks

    Cloud radio access networks (C‐RAN) are a promising technology that will allow the new generation of 5G mobile communication systems to address the industry's capacity growth needs and demands for higher mobility. At the same time, energy‐efficient operation will be delivered together with operating and capital cost savings. However, despite the significant benefits of C‐RAN technology in 5G mobile communication systems, it has to face multiple inherent security challenges associated with virtual systems and cloud computing technology, which may hinder its successful establishment in the market. Thus, it is critical to address these challenges to enable C‐RAN technology to reach its full potential and foster the deployment of future 5G mobile communication systems. Therefore, this chapter presents representative examples of possible threats and attacks against the main components of the C‐RAN architecture in order to shed light on the security challenges of C‐RAN technology and provide a roadmap to ensure security in this emerging technology.

  • Testing Considerations

    This chapter considers the incremental testing appropriate to assure that application service quality meets expectations when deployed on cloud infrastructure. It begins by framing the context of this testing, then discusses testing strategy, simulating virtualized infrastructure impairments and test planning. Suppliers must design applications to be tolerant of the variations that will be experienced when the application is deployed across different cloud service providers?> infrastructures. This configuration variability leads one to consider several strategy topics when framing service quality test plans. Best practice is for the service quality test campaign for a cloud-based application to include aspects of most or all of the following test types: service reliability and latency, impaired infrastructure testing; robustness testing; endurance/stability testing; application elasticity testing; upgrade testing; disaster recovery testing; and extreme coresidency testing.

  • Cloud Networks

    Cloud networks connect compute, storage, and management resources of cloud infrastructure and provide network services to all tenants of the cloud computing environment. The objective of this chapter is to enable readers to gain a comprehensive overview of the characteristics, categories and architecture of cloud networks.

  • Impact of C‐IoT and Tips

    This chapter assesses impact of Internet of Things (IoT) on business processes and impact on the quality of our lives. This chapter also describes considerations for developing differentiated C‐IoT (collaborative Internet of Things) solutions and concludes with providing practical tips in maintaining digital lifestyle by looking at the changes that are emerging in the workforce, in technology and adoption of wearable devices, and the effect of robotics including the emergence of mobile robotics in the car, hospitals, hotels, homes, and others.

  • Connecting the Dots

    Part I of this book considered the resource facing service impairments introduced by virtualization and cloud that risk degrading the customer facing service offered by cloud-based applications. Part II analyzed those risks, and Part III offered recommendations to mitigate the end user service impact of those risks. This chapter summarizes the key points from these three parts. It discusses application service quality challenge, four redundancy models, and designs for scalability, extensibility, and failure. The chapter elucidates the actions recommended to assure the feasibility and likelihood of cloud- based applications consistently achieving their service quality expectations. A section considers the challenge of taking an existing or traditional application that is successfully deployed on native hardware configurations to cloud while continuing to deliver at least comparable service quality to end users. This book methodically delineates and analyzes the risks, and offers concrete recommendations to enable applications deployed to cloud to deliver service quality.

  • Insiders

    The problem of insiders in organizations is one of the most complex problems to deal with. This is because insiders have to be trusted to perform their daily business processes. In Cloud, the problem of insiders is even more complicated, as the domain of insiders is bigger than organizations and insiders have a higher motivation to attack Cloud applications. This chapter analyzes this problem and provides a systematic method to identify potential and malicious insiders in the Cloud environment.



Standards related to Cloud Computing

Back to Top

No standards are currently tagged "Cloud Computing"