2020 ACM Cloud Computing Security (CCSW) at CCS November 9, 2020, Orlando, Florida (or virtual) https://ccsw.io (submission due 5 days after CCS notification deadline) Dear Colleagues, Time flies. We're organizing the 11th edition of CCSW! As you may remember, the past workshops were tremendous successes, with large audiences, numerous sponsors (NSF, Microsoft, Private Machines, Ant Financial, NEC etc), many keynotes, and excellent papers. We hope you will join us again for yet another successful event! SIGNIFICANT IMPACT CCSW has had a significant impact in our research community. As of May 2020, in the Google Scholar Metrics entry for CCS, 4 of the top 20 cited CCS papers come from CCSW. You are as likely or perhaps more likely to have a top 20 paper publishing in CCSW than in CCS! (thanks to Ari Juels for noticing this) DATES Submissions due (5 days after CCS notification): 26 July, 2020 (11:59pm anywhere in the world) Submission URL: https://easychair.org/conferences/?conf=ccsw2020 SUMMARY Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of corporate and government IT infrastructure. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including but not limited to: + side channel attacks + practical cryptographic protocols for cloud security + secure cloud resource virtualization mechanisms + secure data management outsourcing (e.g., database as a service) + practical privacy and integrity mechanisms for outsourcing + foundations of cloud-centric threat models + secure computation outsourcing + remote attestation mechanisms in clouds + sandboxing and VM-based enforcements + trust and policy management in clouds + secure identity management mechanisms + new cloud-aware web service security paradigms and mechanisms + cloud-centric regulatory compliance issues and mechanisms + business and security risk models and clouds + cost and usability models and their interaction with security + scalability of security in global-size clouds + trusted computing technology and clouds + binary analysis for remote attestation and cloud protection + network security (DOS, IDS etc.) mechanisms for cloud contexts + security for emerging cloud programming models + energy/cost/efficiency of security in clouds + machine learning for cloud protection CCSW especially encourages novel paradigms and controversial ideas that are not on the above list. The workshop has historically acted as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds. CCSW is soliciting full papers of up to 12 pages which will be judged based on the quality per page. Thus, shorter, high-quality papers are encouraged, and papers may be perceived as too long if they are repetitive or verbose. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), excluding the bibliography, well-marked appendices, and supplementary material. Note that reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library. Submissions must be anonymous, and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by one registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs. *** Both research and position/vision/white papers are invited *** Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All authors and their affiliations must be listed. One best paper award will be presented during the workshop. Proposals for panels are also solicited. The proposals are to be concise, up to 2 pages in length, describe the handled topics, name potential panelists and briefly scope the panel for CCSW. Disruptive and controversial panels are particularly encouraged. KEYNOTE SPEAKERS TBA. Multiple highly-visible CTOs, CISOs and applied researchers. Organizers ====================== STEERING Srdjan Capkun, ETH Zurich Emiliano De Cristofaro, University College London Kristin Lauter, Microsoft Research Radu Sion, Stony Brook University (chair) Yinqian Zhang, Ohio State University CHAIRS Yinqian Zhang, Ohio State University (chair) Radu Sion, Stony Brook University (co-chair) PROGRAM COMMITTEE Alin Tomescu, VMware Research Alpa Trivedi, Intel Alptekin Kupcu, Koc University Anil Somayaji, Carleton University Anrin Chakraborti, Stony Brook University Bogdan Carbunar, Florida International University Byoungyoung Lee, Seoul National University Charles Wright, Portland State University Dimitrios Papadopoulos, The Hong Kong University of Science and Technology Erik-Oliver Blass, Airbus Group Innovations Evgenios Kornaropoulos, University of California, Berkeley Ghassan Karame, NEC Laboratories Europe Giorgos Vasiliadis, Qatar Computing Research Institute - HBKU Guoxing Chen, Facebook Haya Shulman, Fraunhofer Institute for Secure Information Technology Huibo Wang, Baidu Security Ioannis Demertzis, University of Maryland Joel Coffman, United States Air Force Academy Leendert Van Doorn, Microsoft Matthias Schunter, Intel Melek Onen, EURECOM Ni Trieu, UC Berkeley Nigel Smart, imec-COSIC, KU Leuven Nikos Triandopoulos, Stevens Institute of Technology Pierangela Samarati, Universita' degli Studi di Milano, Italy Reyhaneh Safavi-Naini, University of Calgary Roberto Di Pietro, Hamad Bin Khalifa University - College of Science and Engineering Ruby Lee, Princeton University Sean Smith, Dartmouth College Sotiris Ioannidis, FORTH Stefan Katzenbeisser, University of Passau Tarik Moataz, Aroki Systems Thomas Schneider, TU Darmstadt Tianwei Zhang, Nanyang Technological University Xiaokuan Zhang, The Ohio State University Yan Huang, Indiana University Bloomington Yang Zhang, CISPA Helmholtz Center for Information Security Yuqiong Sun, Symantec Research Labs Zhenyu Ning, Southern University of Science and Technology and Wayne State University Zhou Li, University of California, Irvine