8th Annual GSTF International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS) 2017 Singapore

  • Conference Call
  • The 8th Annual Inter­na­tional Con­fer­ence on ICT: Big Data, Cloud and Secu­rity (ICT-​BDCS) 2017 serves as a plat­form for indus­try pro­fes­sion­als, aca­d­e­mics, researchers, sci­en­tists, con­sul­tants and pol­icy mak­ers to inter­act and dis­cuss var­i­ous issues in big data, cloud com­put­ing and IT secu­rity. The event will com­mence on August 2122, 2017 in Sin­ga­pore and is organ­ised by the Global Sci­en­tific and Tech­nol­ogy Forum (GSTF).

    Con­fer­ence Theme

    Big Data is a key enabler of explor­ing busi­ness insights and eco­nom­ics of ser­vices and is already mak­ing large impacts in finance, man­u­fac­tur­ing, retail, and social net­works. BDCS 2017’s include but not lim­ited to: Big Data Archi­tec­ture, Big Data Mod­el­ing, Big Data As A Ser­vice, Big Data for Ver­ti­cal Indus­tries (Gov­ern­ment, Health­care, etc.), Big Data Ana­lyt­ics, Big Data Toolk­its, Big Data Open Plat­forms, Eco­nomic Analy­sis, Big Data for Enter­prise Trans­for­ma­tion, Big Data in Busi­ness Per­for­mance Man­age­ment, Big Data for Busi­ness Model Inno­va­tions and Ana­lyt­ics, Big Data in Enter­prise Man­age­ment Mod­els and Prac­tices, Big Data in Gov­ern­ment Man­age­ment Mod­els and Prac­tices, and Big Data in Smart Planet Solutions.

    Com­put­ing in its purest form has changed a lot of times. From the early stages of the main­frames where larger and more expen­sive, to smaller and more afford­able per­sonal com­put­ers and servers to a newer, emerg­ing tech­nol­ogy, cloud com­put­ing. It is an emerg­ing research topic widely dis­cussed within the com­mu­nity of dis­trib­uted sys­tems and Grid com­put­ing experts. It promises to vastly change how we use, man­age and imple­ment the com­put­ing sys­tems both in the pub­lic and pri­vate sec­tor. We are accept­ing papers with top­ics but not lim­ited to new appli­ca­tions for clouds, mobile clouds, cloud man­age­ment and con­fig­u­ra­tion, cloud eco­nom­ics, core cloud ser­vices, cloud tech­nolo­gies and vir­tu­al­iza­tion platforms.

    In IT Secu­rity, we con­stantly hear infor­ma­tion how hack­ers find new and scary ways to access – and mis­use — priv­i­leged infor­ma­tion for unscrupu­lous or ques­tion­able pur­poses. The con­fer­ence hopes to address these con­cerns as you learn all about actual and impor­tant IT-​Security trends, tech­nolo­gies and solu­tions to get real answers of your ques­tions and prac­ti­cal ben­e­fits to meet today´s and tomorrow’s threats. Pos­si­ble top­ics include, but are not lim­ited to: access con­trol, account­abil­ity, anonymity, authen­ti­ca­tion, crit­i­cal infra­struc­ture secu­rity, data and sys­tem integrity, data­base secu­rity, exe­cutable con­tent, for­mal meth­ods and ver­i­fi­ca­tion, game the­ory and deci­sion the­ory, hard­ware– based secu­rity, humans and com­puter secu­rity, intru­sion detec­tion, language-​based secu­rity, net­work secu­rity, pri­vacy, prove­nance, resource usage con­trol, secu­rity for mobile com­put­ing, secu­rity mod­els, secu­rity pro­to­cols, soft­ware secu­rity, socio-​technical secu­rity, trust man­age­ment, usable secu­rity and web security.

    The con­fer­ence seeks sub­mis­sions from acad­e­mia, gov­ern­ment, and indus­try pre­sent­ing novel research on all prac­ti­cal and the­o­ret­i­cal aspects in the field of cloud com­put­ing, big data and IT secu­rity. It pro­vides a key forum for researchers and indus­try prac­ti­tion­ers to exchange infor­ma­tion regard­ing advance­ments in the state of art and prac­tice of these fields in today’s ubiq­ui­tous and vir­tual environment.

    Keynote Speakers

    • Prof. Ben­jamin W. Wah – Pro­fes­sor of Com­puter Sci­ence and Engi­neer­ing, Chi­nese Uni­ver­sity of Hong Kong: “Using Ker­nels to Har­ness the Com­plex­ity of Big Data“
    • Prof. Lynn Mar­garet Bat­ten – Deakin Research Chair in Math­e­mat­ics, School of Infor­ma­tion Tech­nol­ogy, Deakin Uni­ver­sity, Aus­tralia: “Robust Trust Assess­ment Model for the Selec­tion of Trust­wor­thy Cloud Ser­vices“


    Work­shop on “Dig­i­tal Busi­ness: Tech­nolo­gies and Transformation“

    22 August

    By Prof. Venky Shankarara­man and Prof Swapna Got­ti­pati – School of Infor­ma­tion Sys­tems, Sin­ga­pore Man­age­ment University

    On com­plet­ing this work­shop, you will be able to: Eval­u­ate the oppor­tu­ni­ties and chal­lenges of dif­fer­ent dig­i­tal tech­nolo­gies namely, cloud com­put­ing, big data and ana­lyt­ics, mobile net­works, social media, and the Inter­net of Things in dri­ving transformation

    Analyse dig­i­tal trans­for­ma­tion case stud­ies to explain how an orga­ni­za­tion can:

    • Dig­i­tally enhance operations
    • Engage bet­ter with their customers
    • Cre­ate a dig­i­tal vision
    • Gov­ern their dig­i­tal activities

    Ideate how an exist­ing orga­ni­za­tion can become dig­i­tal and for­mu­late a dig­i­tal trans­for­ma­tion strategy

    Work­shop on “Why Cyber Secu­rity is a Strate­gic Issue?“

    By Prof. the Hon. Dr. Stephen Mar­tin — Chair­man, Bank of China (Aus­tralia), For­mer Speaker Par­lia­ment of Aus­tralia, For­mer Deputy Vice Chan­cel­lor (Strat­egy and Plan­ning), Curtin Uni­ver­sity of Tech­nol­ogy, For­mer Pro Vice Chan­cel­lor Inter­na­tional, Vic­to­ria Uni­ver­sity, Australia

    This work­shop will pro­vide busi­nesses with detailed infor­ma­tion on the strate­gic impor­tance of cyber-​security and high­light the crit­i­cal need to main­tain robust pro­tec­tion mea­sures. Prof Mar­tin will pro­vide insights on what works from a strate­gic per­spec­tive, and dis­cuss impli­ca­tions for the economy.


    • Con­fer­ence Pro­ceed­ings: All accepted and pre­sented papers at the con­fer­ence (ICT-​BDCS 2017) will be pub­lished in the con­fer­ence pro­ceed­ings (Print ISSN: 22512136, E-​periodical: 22512144).
    • Jour­nal on Com­put­ing: All authors who present their papers at the con­fer­ence will be invited to sub­mit an extended ver­sion of their research paper for the GSTF Jour­nal on Com­put­ing (JoC) — Print ISSN: 22513043, E-​periodical: 20102283. All sub­mit­ted papers will go through a blind review process for accep­tance and will be pub­lished with­out addi­tional cost (digital).
    • Best Paper Awards and Best Stu­dent Paper Awards will be con­ferred at the con­fer­ence (in order to qual­ify for the award, the paper must be pre­sented at the conference).
    • Panel Pro­pos­als are invited for sub­mis­sion. A min­i­mum of three papers cen­ter­ing on a spe­cific topic will be accepted for sub­mis­sion under Panel Category.

    Con­fer­ence Topics

    The top­ics of inter­est include, but are not lim­ited to:

    Big Data

    • Archi­tec­tures for Big Data
    • Big Data & Bioinformatics
    • Big Data & Security
    • Big Data & Virtualization
    • Big Data Analytics
    • Big Data Economics
    • Big Data Search
    • Big Data Tools Landscape
    • Fed­eral Big Data
    • Object Stor­age for Big Unstruc­tured Data
    • Pre­dic­tive Analytics
    • Rise of Data­base Sharing
    • Scal­ing Big Data

    Cloud Com­put­ing and Virtualization

    • Cloud Com­put­ing Architectures
    • Cloud Con­fig­u­ra­tion, Per­for­mance, and Capac­ity Management
    • Cloud Migra­tion
    • Cloud Resource Vir­tu­al­iza­tion and Composition
    • Cloud Soft­ware Patch and License Management
    • Cloud Solu­tion Design Patterns
    • Cloud Work­load Pro­fil­ing and Deploy­ment Control
    • Eco­nomic, Busi­ness and ROI Mod­els for Cloud Computing
    • Green Cloud Computing
    • High Per­for­mance Cloud Computing
    • Infra­struc­ture, Plat­form, Appli­ca­tion, Busi­ness, Social, and Mobile Clouds
    • Model Dri­ven Cloud Computing
    • Secu­rity, Pri­vacy, and Com­pli­ance Man­age­ment in Clouds
    • Self-​service Cloud Por­tal, Dash­board, and Analytics
    • Ser­vice Level Agree­ment (SLA)
    • Stor­age, Data, and Ana­lyt­ics Clouds

    Cloud and Grid Security

    • Design Tool for Cloud Computing
    • Green Cloud Com­put­ing & Eco­nom­ics of the Cloud
    • Mon­i­tor­ing, Man­age­ment and Main­te­nance of Clouds
    • Per­for­mance Improve­ments for Cloud Computing
    • Pro­gram­ming Mod­els and Systems/​Tools
    • Qual­ity of Ser­vice (QoS) in Cloud Computing
    • Secu­rity, Pri­vacy and Cryp­tog­ra­phy in Clouds
    • Service-​Oriented Archi­tec­ture and Cloud Computing
    • Vir­tu­al­iza­tion Trends & Chal­lenges for Cloud Computing

    Cryp­tog­ra­phy and Algorithms

    • Analy­sis of Secu­rity Protocols
    • Cryp­to­graphic Algo­rithms, Hash Functions
    • Cryp­to­graphic Prim­i­tives and Secu­rity Protocols
    • Dig­i­tal Signatures
    • Iden­tity Management
    • Key Dis­tri­b­u­tion and Management
    • Pri­vacy, Anonymity and Traceability
    • Prov­able Security
    • Secure Sys­tem Implementation

    Mul­ti­me­dia Security

    • Dig­i­tal Rights Management
    • Image, Audio and Video Encryp­tion Mechanisms
    • Intel­li­gent Mul­ti­me­dia Secu­rity Services
    • Mul­ti­me­dia Forensics
    • Pri­vacy and Secu­rity in Sur­veil­lance Videos
    • Secu­rity of VOIP and multimedia
    • Steganog­ra­phy and Dig­i­tal Watermarking

    Infor­ma­tion and Net­work Security

    • Access Con­trols and Secu­rity Mechanisms
    • Busi­ness Con­ti­nu­ity & Dis­as­ter Recov­ery Planning
    • Cyber Secu­rity
    • Data­base and Sys­tem Security
    • Fire­walls
    • Hack­ing and Defending
    • High Per­for­mance Secu­rity Systems
    • Insider Threats
    • Inter­net Secu­rity & Applications
    • Intru­sion Detec­tion and Prevention
    • Mal­wares
    • Model-​driven security
    • Net­work Monitoring
    • Net­work Secu­rity Poli­cies: Imple­men­ta­tion and Management
    • Phys­i­cal Security
    • SAN/​NAS Security
    • Secure Oper­at­ing Systems
    • Secure Rout­ing and Net­work Management
    • Secu­rity in Con­tent Deliv­ery Networks
    • Secu­rity in High Speed Network
    • Secu­rity in Opti­cal Sys­tems and Networks
    • Web Secu­rity, Web Ser­vices and Enter­prise Security

    Secu­rity and Pri­vacy Issues in Networks

    • Ad Hoc Networks
    • E-​Governance and E-​commerce
    • Inter­net of Things
    • Mobile Net­works
    • P2P Net­works
    • Satel­lite Networks
    • Sen­sor Networks
    • Social Net­works
    • VANET Net­works
    • Wire­less Networks
    starting: ending: 22.08.2017 Location: , Category:


    paper submission expired register now Conference START 22.08.2017 END

    Conference Facts

    Location , Category Organiser More Info Conference Website

    Further interesting Conferences