W-P2DS
  • CFP
  • Committees
  • Dates
  • Paper submission
  • Program

CFP

Call For Papers

Cloud Computing has fostered a significant shift in the way applications and services are deployed and managed. The pay-as-you-go model and attractive features of cloud infrastructures such as elasticity, availability and convenience have encouraged many companies and organizations into deploying their infrastructures on third-party cloud providers. This has created impressive scale datacenters aggregating unprecedented amounts of information. In this context, serious privacy and confidentiality issues arise; massive scale surveillance has become a reality and individual’s privacy almost a luxury. Although a multitude of encryption and privacy-preserving mechanisms exist, there is still a significant gap between the theoretical body of knowledge and its applications in real-world systems. The goal of the workshop is to gather researchers and practitioners from the cryptography, distributed systems, and security systems communities to discuss the current state of the art, emerging challenges and trends, as well as novel solutions, implementation and deployment of privacy-preserving systems and applications. The focus is on concrete applications that bring privacy-preserving mechanisms into cloud computing infrastructures. The workshop is looking for submissions in the form of papers with 6 pages or less describing novel contributions and results as well as experimental reports. The organization welcomes contributions from both academia and industry. Industry submissions (or submissions with co-authors from industry) should be labeled as such for notifying reviewers. All submissions will be reviewed by members of the workshop program committee, who will select the best submissions for presentation at the workshop. Accepted papers will appear in the workshop proceedings published in conjunction with the proceedings of EuroSys. Topics of interest include, but are not limited to, the following:

  • Privacy in cloud computing
  • Privacy-preverving analytics
  • Big data privacy
  • Blockchain and cryptocurrency privacy
  • Privacy-preserving data processing
  • Functional encryption
  • Multiparty computation
  • Secure computation from trusted hardware
  • Secure distributed systems
  • Privacy-by-design for the IoT
  • Privacy-preserving data markets
  • Privacy-preserving systems for cloud computing
  • Secure communications

CFP in .txt

© 2018 W-P2DS