8th Annual GSTF International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS) 2017 Singapore

  • Conference Call
  • The 8th Annual Inter­na­tional Con­fer­ence on ICT: Big Data, Cloud and Secu­rity (ICT-​BDCS) 2017 serves as a plat­form for indus­try pro­fes­sion­als, aca­d­e­mics, researchers, sci­en­tists, con­sul­tants and pol­icy mak­ers to inter­act and dis­cuss var­i­ous issues in big data, cloud com­put­ing and IT secu­rity. The event will com­mence on August 2122, 2017 in Sin­ga­pore and is organ­ised by the Global Sci­en­tific and Tech­nol­ogy Forum (GSTF).

    Con­fer­ence Theme

    Big Data is a key enabler of explor­ing busi­ness insights and eco­nom­ics of ser­vices and is already mak­ing large impacts in finance, man­u­fac­tur­ing, retail, and social net­works. BDCS 2017’s include but not lim­ited to: Big Data Archi­tec­ture, Big Data Mod­el­ing, Big Data As A Ser­vice, Big Data for Ver­ti­cal Indus­tries (Gov­ern­ment, Health­care, etc.), Big Data Ana­lyt­ics, Big Data Toolk­its, Big Data Open Plat­forms, Eco­nomic Analy­sis, Big Data for Enter­prise Trans­for­ma­tion, Big Data in Busi­ness Per­for­mance Man­age­ment, Big Data for Busi­ness Model Inno­va­tions and Ana­lyt­ics, Big Data in Enter­prise Man­age­ment Mod­els and Prac­tices, Big Data in Gov­ern­ment Man­age­ment Mod­els and Prac­tices, and Big Data in Smart Planet Solutions.

    Com­put­ing in its purest form has changed a lot of times. From the early stages of the main­frames where larger and more expen­sive, to smaller and more afford­able per­sonal com­put­ers and servers to a newer, emerg­ing tech­nol­ogy, cloud com­put­ing. It is an emerg­ing research topic widely dis­cussed within the com­mu­nity of dis­trib­uted sys­tems and Grid com­put­ing experts. It promises to vastly change how we use, man­age and imple­ment the com­put­ing sys­tems both in the pub­lic and pri­vate sec­tor. We are accept­ing papers with top­ics but not lim­ited to new appli­ca­tions for clouds, mobile clouds, cloud man­age­ment and con­fig­u­ra­tion, cloud eco­nom­ics, core cloud ser­vices, cloud tech­nolo­gies and vir­tu­al­iza­tion platforms.

    In IT Secu­rity, we con­stantly hear infor­ma­tion how hack­ers find new and scary ways to access – and mis­use — priv­i­leged infor­ma­tion for unscrupu­lous or ques­tion­able pur­poses. The con­fer­ence hopes to address these con­cerns as you learn all about actual and impor­tant IT-​Security trends, tech­nolo­gies and solu­tions to get real answers of your ques­tions and prac­ti­cal ben­e­fits to meet today´s and tomorrow’s threats. Pos­si­ble top­ics include, but are not lim­ited to: access con­trol, account­abil­ity, anonymity, authen­ti­ca­tion, crit­i­cal infra­struc­ture secu­rity, data and sys­tem integrity, data­base secu­rity, exe­cutable con­tent, for­mal meth­ods and ver­i­fi­ca­tion, game the­ory and deci­sion the­ory, hard­ware– based secu­rity, humans and com­puter secu­rity, intru­sion detec­tion, language-​based secu­rity, net­work secu­rity, pri­vacy, prove­nance, resource usage con­trol, secu­rity for mobile com­put­ing, secu­rity mod­els, secu­rity pro­to­cols, soft­ware secu­rity, socio-​technical secu­rity, trust man­age­ment, usable secu­rity and web security.

    The con­fer­ence seeks sub­mis­sions from acad­e­mia, gov­ern­ment, and indus­try pre­sent­ing novel research on all prac­ti­cal and the­o­ret­i­cal aspects in the field of cloud com­put­ing, big data and IT secu­rity. It pro­vides a key forum for researchers and indus­try prac­ti­tion­ers to exchange infor­ma­tion regard­ing advance­ments in the state of art and prac­tice of these fields in today’s ubiq­ui­tous and vir­tual environment.

    Keynote Speakers

    • Prof. Ben­jamin W. Wah – Pro­fes­sor of Com­puter Sci­ence and Engi­neer­ing, Chi­nese Uni­ver­sity of Hong Kong: “Using Ker­nels to Har­ness the Com­plex­ity of Big Data“
    • Prof. Lynn Mar­garet Bat­ten – Deakin Research Chair in Math­e­mat­ics, School of Infor­ma­tion Tech­nol­ogy, Deakin Uni­ver­sity, Aus­tralia: “Robust Trust Assess­ment Model for the Selec­tion of Trust­wor­thy Cloud Ser­vices“


    Work­shop on “Dig­i­tal Busi­ness: Tech­nolo­gies and Transformation“

    22 August

    By Prof. Venky Shankarara­man and Prof Swapna Got­ti­pati – School of Infor­ma­tion Sys­tems, Sin­ga­pore Man­age­ment University

    On com­plet­ing this work­shop, you will be able to: Eval­u­ate the oppor­tu­ni­ties and chal­lenges of dif­fer­ent dig­i­tal tech­nolo­gies namely, cloud com­put­ing, big data and ana­lyt­ics, mobile net­works, social media, and the Inter­net of Things in dri­ving transformation

    Analyse dig­i­tal trans­for­ma­tion case stud­ies to explain how an orga­ni­za­tion can:

    • Dig­i­tally enhance operations
    • Engage bet­ter with their customers
    • Cre­ate a dig­i­tal vision
    • Gov­ern their dig­i­tal activities

    Ideate how an exist­ing orga­ni­za­tion can become dig­i­tal and for­mu­late a dig­i­tal trans­for­ma­tion strategy

    Work­shop on “Why Cyber Secu­rity is a Strate­gic Issue?“

    By Prof. the Hon. Dr. Stephen Mar­tin — Chair­man, Bank of China (Aus­tralia), For­mer Speaker Par­lia­ment of Aus­tralia, For­mer Deputy Vice Chan­cel­lor (Strat­egy and Plan­ning), Curtin Uni­ver­sity of Tech­nol­ogy, For­mer Pro Vice Chan­cel­lor Inter­na­tional, Vic­to­ria Uni­ver­sity, Australia

    This work­shop will pro­vide busi­nesses with detailed infor­ma­tion on the strate­gic impor­tance of cyber-​security and high­light the crit­i­cal need to main­tain robust pro­tec­tion mea­sures. Prof Mar­tin will pro­vide insights on what works from a strate­gic per­spec­tive, and dis­cuss impli­ca­tions for the economy.


    • Con­fer­ence Pro­ceed­ings: All accepted and pre­sented papers at the con­fer­ence (ICT-​BDCS 2017) will be pub­lished in the con­fer­ence pro­ceed­ings (Print ISSN: 22512136, E-​periodical: 22512144).
    • Jour­nal on Com­put­ing: All authors who present their papers at the con­fer­ence will be invited to sub­mit an extended ver­sion of their research paper for the GSTF Jour­nal on Com­put­ing (JoC) — Print ISSN: 22513043, E-​periodical: 20102283. All sub­mit­ted papers will go through a blind review process for accep­tance and will be pub­lished with­out addi­tional cost (digital).
    • Best Paper Awards and Best Stu­dent Paper Awards will be con­ferred at the con­fer­ence (in order to qual­ify for the award, the paper must be pre­sented at the conference).
    • Panel Pro­pos­als are invited for sub­mis­sion. A min­i­mum of three papers cen­ter­ing on a spe­cific topic will be accepted for sub­mis­sion under Panel Category.

    Con­fer­ence Topics

    The top­ics of inter­est include, but are not lim­ited to:

    Big Data

    • Archi­tec­tures for Big Data
    • Big Data & Bioinformatics
    • Big Data & Security
    • Big Data & Virtualization
    • Big Data Analytics
    • Big Data Economics
    • Big Data Search
    • Big Data Tools Landscape
    • Fed­eral Big Data
    • Object Stor­age for Big Unstruc­tured Data
    • Pre­dic­tive Analytics
    • Rise of Data­base Sharing
    • Scal­ing Big Data

    Cloud Com­put­ing and Virtualization

    • Cloud Com­put­ing Architectures
    • Cloud Con­fig­u­ra­tion, Per­for­mance, and Capac­ity Management
    • Cloud Migra­tion
    • Cloud Resource Vir­tu­al­iza­tion and Composition
    • Cloud Soft­ware Patch and License Management
    • Cloud Solu­tion Design Patterns
    • Cloud Work­load Pro­fil­ing and Deploy­ment Control
    • Eco­nomic, Busi­ness and ROI Mod­els for Cloud Computing
    • Green Cloud Computing
    • High Per­for­mance Cloud Computing
    • Infra­struc­ture, Plat­form, Appli­ca­tion, Busi­ness, Social, and Mobile Clouds
    • Model Dri­ven Cloud Computing
    • Secu­rity, Pri­vacy, and Com­pli­ance Man­age­ment in Clouds
    • Self-​service Cloud Por­tal, Dash­board, and Analytics
    • Ser­vice Level Agree­ment (SLA)
    • Stor­age, Data, and Ana­lyt­ics Clouds

    Cloud and Grid Security

    • Design Tool for Cloud Computing
    • Green Cloud Com­put­ing & Eco­nom­ics of the Cloud
    • Mon­i­tor­ing, Man­age­ment and Main­te­nance of Clouds
    • Per­for­mance Improve­ments for Cloud Computing
    • Pro­gram­ming Mod­els and Systems/​Tools
    • Qual­ity of Ser­vice (QoS) in Cloud Computing
    • Secu­rity, Pri­vacy and Cryp­tog­ra­phy in Clouds
    • Service-​Oriented Archi­tec­ture and Cloud Computing
    • Vir­tu­al­iza­tion Trends & Chal­lenges for Cloud Computing

    Cryp­tog­ra­phy and Algorithms

    • Analy­sis of Secu­rity Protocols
    • Cryp­to­graphic Algo­rithms, Hash Functions
    • Cryp­to­graphic Prim­i­tives and Secu­rity Protocols
    • Dig­i­tal Signatures
    • Iden­tity Management
    • Key Dis­tri­b­u­tion and Management
    • Pri­vacy, Anonymity and Traceability
    • Prov­able Security
    • Secure Sys­tem Implementation

    Mul­ti­me­dia Security

    • Dig­i­tal Rights Management
    • Image, Audio and Video Encryp­tion Mechanisms
    • Intel­li­gent Mul­ti­me­dia Secu­rity Services
    • Mul­ti­me­dia Forensics
    • Pri­vacy and Secu­rity in Sur­veil­lance Videos
    • Secu­rity of VOIP and multimedia
    • Steganog­ra­phy and Dig­i­tal Watermarking

    Infor­ma­tion and Net­work Security

    • Access Con­trols and Secu­rity Mechanisms
    • Busi­ness Con­ti­nu­ity & Dis­as­ter Recov­ery Planning
    • Cyber Secu­rity
    • Data­base and Sys­tem Security
    • Fire­walls
    • Hack­ing and Defending
    • High Per­for­mance Secu­rity Systems
    • Insider Threats
    • Inter­net Secu­rity & Applications
    • Intru­sion Detec­tion and Prevention
    • Mal­wares
    • Model-​driven security
    • Net­work Monitoring
    • Net­work Secu­rity Poli­cies: Imple­men­ta­tion and Management
    • Phys­i­cal Security
    • SAN/​NAS Security
    • Secure Oper­at­ing Systems
    • Secure Rout­ing and Net­work Management
    • Secu­rity in Con­tent Deliv­ery Networks
    • Secu­rity in High Speed Network
    • Secu­rity in Opti­cal Sys­tems and Networks
    • Web Secu­rity, Web Ser­vices and Enter­prise Security

    Secu­rity and Pri­vacy Issues in Networks

    • Ad Hoc Networks
    • E-​Governance and E-​commerce
    • Inter­net of Things
    • Mobile Net­works
    • P2P Net­works
    • Satel­lite Networks
    • Sen­sor Networks
    • Social Net­works
    • VANET Net­works
    • Wire­less Networks
    starting: ending: 22.08.2017 Location: , Category:


    Conference START 22.08.2017 END

    All deadlines have expired!

    This conference has no more open deadlines. There may be successive conferences coming up you may by interested in.

    Please check our conference list and search...

    Conference Facts

    Location , Category Organiser More Info Conference Website

    Further interesting Conferences

    Currently we have no similar events listed. Please check our website regulary, subscribe to our RSS-Feed or follow us on twitter for new listings.