IEEE Transactions on Cloud Computing, Special Issue on "Cloud Security Engineering" (Due 31 March 2015) Editors: Kim-Kwang Raymond Choo, University of South Australia (Australia); Omer Rana, Cardiff University (UK); Muttukrishnan Rajarajan, City University London (UK) As the use of cloud computing grows throughout society in general, it is essential that cloud service providers and cloud service users ensure that security and privacy safeguards are in place. There is, however, no perfect security and when a cybersecurity incident occurs, digital investigation will require the identification, preservation and analysis of evidential data. This special issue is dedicated to the identification of techniques that enable security mechanisms to be engineered and implemented in Cloud-based systems. A key focus will be on the integration of theoretical foundations with practical deployment of security strategies that make Cloud systems more secure for both end users and providers - enabling end users to increase the level of trust they have in Cloud providers - and conversely for Cloud service providers to provide greater guarantees to end users about the security of their services and data. Significant effort has been invested in performance engineering of Cloud-based systems, with a variety of research-based and commercial tools that enable autoscaling of Cloud systems, mechanisms for supporting Service Level Agreement-based provisioning and adaptation and more recently for supporting energy management of large scale data centres. This special issue will be devoted to understanding whether a similar engineering philosophy can be extended to support security mechanisms, and more importantly, whether experience from the performance engineering community (who often need to carry out analysis on large log files) can be carried over into the security domain. We encourage authors to be exploratory in their papers - reporting on novel use of performance engineering tools that could be repurposed for supporting security management and vice versa. Topics of interest include: * Advanced security features * Anonymity * Cloud forensic and anti-forensic techniques and implementations * Cloud privacy * Cloud-based honeypots * Cloud-based intrusion detection and prevention systems * Distributed authentication and authentication * Implementation of cryptographic and key management strategies in clouds (e.g. homomorphic encryption for cloud computing) * Multi-Cloud security provisioning * Real time analysis of security (log) data for alert generation * Remote collection of evidence (e.g. from cloud servers) * Security-focused Service Level Agreements For more information, please visit http://www.computer.org/cms/Computer.org/transactions/cfps/cfp_tccsi_cse.pdf --------------- Elsevier Journal of Computer and System Sciences, Special Issue on "Cyber Security in the Critical Infrastructure: Advances and Future Directions" (Due 31 August 2015) Editors: Jemal Abawajy, Deakin University (Australia); Kim-Kwang Raymond Choo, University of South Australia (Australia); Rafiqul Islam, Charles Sturt University (Australia) This special issue invites original research papers that reports on state-of-the-art and recent advancements in securing our critical infrastructure and cyberspace, with a particular emphasis on novel techniques to build resilient critical information infrastructure. Topics of interest include but are not limited to * Cyber security mitigation techniques for critical infrastructures such as banking and finance, communications, emergency services, energy, food chain, health, mass gatherings, transport and water; * Cyber threat modelling and analysis; * Cyber forensics; * Visual analytics and risk management techniques for cyber security; and * Cyber security test beds, tools, and methodologies. For more information, please visit http://www.journals.elsevier.com/journal-of-computer-and-system-sciences/call-for-papers/cyber-security-in-the-critical-infrastructure-advances-and-f/