Call for Papers IEEE Cloud Computing www.computer.org/cloudcomputing Special Issue on Cloud Security Submission deadline: 29 February 2016 Publication date: September/October 2016 Many critical applications - from medical, financial, and big data applications to applications with real-time constraints - are being migrated to cloud platforms. It's been predicted that the bulk of future IT infrastructure spending will be on cloud platforms and applications, and nearly half of all large enterprises are planning cloud deployments by the end of 2017. However, cloud computing systems and services are also major targets for cyberattackers. Because the cloud infrastructure is always, to a certain degree, an open and shared resource, it's subject to malicious attacks from both insiders and outsiders. Side-channel attacks, identity hijacking, and distribution of malicious code have all been observed. Thus, centralized management of security in cloud environments needs to be carefully analyzed and maintained. These vulnerabilities point to the importance of protecting cloud platforms, infrastructures, hosted applications, and information data, and create demand for much higher-level cloud security management than is available today. This calls for comprehensive vulnerability analyses and massive theoretical and practical innovation in security technologies. This special issue aims to address these needs. Areas of interest for the special issue include, but are not limited to: - Access control mechanisms for clouds - Cloud security management - Colluding attacks over multiple clouds - Distributed denial of service in clouds - Information retrieval on encrypted data in clouds - Information sharing and data protection in clouds - Intrusion detection in clouds - Privacy policy framework for clouds - Secure applications distributed over clouds - Secure big data in clouds - Security architectures for mobile cloud computing - Security in software-defined networks. - Security protocols for cloud computing - Trust computing for meshed cloud services - Virtualization of security in clouds Special Issue Guest Editors: - Peter Mueller, IBM Zurich Research Laboratory, Zurich, Switzerland - Chin-Tser Huang, University of South Carolina, USA - Shui Yu, Deakin University, Australia - Zahir Tari, RMIT University, Australia - Ying-Dar Lin, National Chiao Tung University, Hsinchu, Taiwan Submission Information: Submissions should be 4,000 to 6,000 words long and should follow the magazine's guidelines on style and presentation. All submissions will be subjected to single-blind, anonymous review in accordance with normal practice for scientific publications. For more information, contact the guest editors at ccm5-2016@computer.org. Authors should not assume that the audience will have specialized experience in a particular sub-field. All accepted articles will be edited according to the IEEE Computer Society style guide (www.computer.org/web/publications/styleguide). Submit your papers to Manuscript Central at https://mc.manuscriptcentral.com/ccm-cs. --