Cloud and Autonomic Computing Conference
The ACM Cloud and Autonomic Computing Conference
(CAC 2013)
InterContinental Hotel, Miami, Florida, USA  August 5-August 8, 2013
  Pictures now available!
  Students: Apply for support!
  Keynotes now available.
  Program now available.
  Cloud Security tutorial added.
  Call for Posters updated.
  Registration page now available.

University of Arizona, USA

Texas Tech University, USA

Barcelona Supercomputing Center, Spain

Mississippi State University, USA

Indiana University, USA

Swedish Institute of Computer Science, Sweden
Paper submission due:
  Mar. 15, 2013, 11:59 pm EST
  Mar. 25, 2013, 11:59 pm EST
Notification to authors:
  May 8, 2013
Final paper due:
  June 1, 2013

This year, CAC will be hosting the following workshops. Papers are solicited for submission to these workshops. More details can be found in the workshop websites.


This year, CAC will be hosting the following tutorial sessions.

Fundamentals of Cloud Security

Instructor: Dr. Salim Hariri

Full day tutorial on August 9, 2013

See registration page for pricing.

Cloud Computing is an emerging paradigm that aims at delivering computing, information services, and data storage as a utility service over a network (e.g., Internet). There is a strong interest in cloud computing due to their performance and host, but their rapid deployment will exacerbate the security problem. In cloud computing, organizations relinquish direct control of many security aspects to the service providers such as trust, privacy preservation, identity management, data and software isolation, and service availability. The adoption and proliferation of cloud computing and services will be severely impacted if cloud security is not adequately addressed. The main goal of this tutorial is discuss the limitations of current cybersecurity approaches to clouds and then focus on the fundamental issues to address the cloud security and privacy such as the confidentiality, integrity and availability of data and computations in clouds. In this tutorial we will examine cloud computing models, look into the threat model and security issues related to data and computations outsourcing, and explore practical applications to make cloud resources secure and resilient to cyber attacks.


    1. Review of Cloud Computing Definition and Architectures
    2. Cloud Computing Models and Deployment Options
    3. Vulnerabilities and Security Issues in Clouds
      • Threats at Infrastructure as a Service (IaaS)
      • Threats at Platform as a Service (PaaS)
      • Threats at Software as a Service (SaaS)
      • Threats in emerging cloud applications, services, etc.
    4. Virtual Machine Security
    5. Trusted Computing Technology and Clouds
    6. Resilient Cloud Services
    7. Cloud Regulatory Compliance Issues
    8. Business and Security Risk Models
    9. Emerging Cloud Services and Applications – Internet of Things (IoT) Security

 © CAC, All rights reserved.

Valid HTML 4.01 Transitional Valid CSS! Florida International University