CLOUD COMPUTING SECURITY CONFERENCE


Cloud Computing Security Conference is one of the leading research topics in the international research conference domain. Cloud Computing Security is a conference track under the Humanities and Social Science Conference which aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Humanities and Social Science.

internationalconference.net provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of (Humanities and Social Science).

Cloud Computing Security is not just a call for academic papers on the topic; it can also include a conference, event, symposium, scientific meeting, academic, or workshop.

You are welcome to SUBMIT your research paper or manuscript to Cloud Computing Security Conference Track will be held at .

Cloud Computing Security is also a leading research topic on Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, Elsevier, Scopus, Web of Science.

FINISHED

I. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

MARCH 19 - 20, 2019
ISTANBUL, TURKEY

FINISHED

III. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

AUGUST 21 - 22, 2019
LONDON, UNITED KINGDOM

FINISHED

IV. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

OCTOBER 08 - 09, 2019
NEW YORK, UNITED STATES

FINISHED

V. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

DECEMBER 12 - 13, 2019
ROME, ITALY

FINISHED

VI. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

FEBRUARY 13 - 14, 2020
LONDON, UNITED KINGDOM

FINISHED

VII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

APRIL 15 - 16, 2020
BARCELONA, SPAIN

FINISHED

VIII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

MAY 11 - 12, 2020
ISTANBUL, TURKEY

FINISHED

IX. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

JUNE 05 - 06, 2020
SAN FRANCISCO, UNITED STATES

FINISHED

X. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

JULY 20 - 21, 2020
PARIS, FRANCE

FINISHED

XI. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

AUGUST 10 - 11, 2020
NEW YORK, UNITED STATES

FINISHED

XII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

SEPTEMBER 10 - 11, 2020
TOKYO, JAPAN

FINISHED

XIII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

SEPTEMBER 16 - 17, 2020
ZÜRICH, SWITZERLAND

FINISHED

XIV. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

OCTOBER 21 - 22, 2020
BARCELONA, SPAIN

FINISHED

XV. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

NOVEMBER 02 - 03, 2020
SAN FRANCISCO, UNITED STATES

FINISHED

XVI. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

NOVEMBER 12 - 13, 2020
ISTANBUL, TURKEY

FINISHED

XVII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

NOVEMBER 19 - 20, 2020
SINGAPORE, SINGAPORE

FINISHED

XVIII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

DECEMBER 15 - 16, 2020
BANGKOK, THAILAND

FINISHED

XIX. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

DECEMBER 28 - 29, 2020
PARIS, FRANCE

FINISHED

XX. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

FEBRUARY 13 - 14, 2021
LONDON, UNITED KINGDOM

FINISHED

XXI. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

APRIL 15 - 16, 2021
BARCELONA, SPAIN

FINISHED

XXII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

MAY 11 - 12, 2021
ISTANBUL, TURKEY

FINISHED

XXIII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

JUNE 05 - 06, 2021
SAN FRANCISCO, UNITED STATES

FINISHED

XXIV. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

JULY 20 - 21, 2021
PARIS, FRANCE

FINISHED

XXV. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

AUGUST 10 - 11, 2021
NEW YORK, UNITED STATES

FINISHED

XXVI. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

SEPTEMBER 10 - 11, 2021
TOKYO, JAPAN

FINISHED

XXVII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

SEPTEMBER 16 - 17, 2021
ZÜRICH, SWITZERLAND

FINISHED

XXVIII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

OCTOBER 21 - 22, 2021
BARCELONA, SPAIN

FINISHED

XXIX. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

NOVEMBER 02 - 03, 2021
SAN FRANCISCO, UNITED STATES

FINISHED

XXX. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

NOVEMBER 12 - 13, 2021
ISTANBUL, TURKEY

FINISHED

XXXI. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

NOVEMBER 19 - 20, 2021
SINGAPORE, SINGAPORE

FINISHED

XXXII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

DECEMBER 15 - 16, 2021
BANGKOK, THAILAND

FINISHED

XXXIII. INTERNATIONAL HUMANITIES AND SOCIAL SCIENCE CONFERENCE

DECEMBER 28 - 29, 2021
PARIS, FRANCE

Humanities and Social Science Conference Call For Papers are listed below:

Previously Published Papers on "Cloud Computing Security Conference"

  • 3D Modeling Approach for Cultural Heritage Structures: The Case of Virgin of Loreto Chapel in Cusco, Peru
    Authors: Rony Reátegui, Cesar Chácara, Benjamin Castañeda, Rafael Aguilar, Keywords: Cloud-to-BIM, cultural heritage, generative modeling, HBIM, parametric modeling, Revit. DOI:10.5281/zenodo. Abstract: Nowadays, Heritage Building Information Modeling (HBIM) is considered an efficient tool to represent and manage information of Cultural Heritage (CH). The basis of this tool relies on a 3D model generally obtained from a Cloud-to-BIM procedure. There are different methods to create an HBIM model that goes from manual modeling based on the point cloud to the automatic detection of shapes and the creation of objects. The selection of these methods depends on the desired Level of Development (LOD), Level of Information (LOI), Grade of Generation (GOG) as well as on the availability of commercial software. This paper presents the 3D modeling of a stone masonry chapel using Recap Pro, Revit and Dynamo interface following a three-step methodology. The first step consists of the manual modeling of simple structural (e.g., regular walls, columns, floors, wall openings, etc.) and architectural (e.g., cornices, moldings and other minor details) elements using the point cloud as reference. Then, Dynamo is used for generative modeling of complex structural elements such as vaults, infills and domes. Finally, semantic information (e.g., materials, typology, state of conservation, etc.) and pathologies are added within the HBIM model as text parameters and generic models’ families respectively. The application of this methodology allows the documentation of CH following a relatively simple to apply process that ensures adequate LOD, LOI and GOG levels. In addition, the easy implementation of the method as well as the fact of using only one BIM software with its respective plugin for the scan-to-BIM modeling process means that this methodology can be adopted by a larger number of users with intermediate knowledge and limited resources, since the BIM software used has a free student license.
  • An Examination of the Factors Affecting the Adoption of Cloud Enterprise Resource Planning Systems in Egyptian Companies
    Authors: Mayar A. Omar, Ismail Gomaa, Heba Badawy, Hosam Moubarak, Keywords: cloud computing, cloud ERP systems, DOI, Egypt, SEM, TOE DOI:10.5281/zenodo. Abstract: Enterprise resource planning (ERP) is an integrated system that helps companies in managing their resources. There are two types of ERP systems, the traditional ERP systems, and the cloud ERP systems. Cloud ERP systems were introduced after the development of cloud computing technology. This research aims to identify the factors that affect the adoption of cloud ERP in Egyptian companies. Moreover, the aim of our study is to provide guidance to Egyptian companies in the cloud ERP adoption decision and to participate in increasing the number of the cloud ERP studies that are conducted in the Middle East and in developing countries. There are many factors influencing the adoption of cloud ERP in Egyptian organizations which are discussed and explained in the research. Those factors are examined through combining the Diffusion of Innovation theory (DOI) and technology-organization-environment framework (TOE). Data were collected through a survey that was developed using constructs from the existing studies of cloud computing and cloud ERP technologies and was then modified to fit our research. The analysis of the data was based on Structural Equation Modeling (SEM) using Smart PLS software that was used for the empirical analysis of the research model.
  • The Effects of Cross-Border Use of Drones in Nigerian National Security
    Authors: H. P. Kerry, Keywords: Armed drones, cross-border, drones, national security. DOI:10.5281/zenodo. Abstract: Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.
  • Entrepreneur Universal Education System: Future Evolution
    Authors: Khaled Elbehiery, Hussam Elbehiery, Keywords: Virtual education, academic degree, certificates, internship, amazon web services, Microsoft Azure, Google cloud platform, hybrid models. DOI:10.5281/zenodo. Abstract: The success of education is dependent on evolution and adaptation, while the traditional system has worked before, one type of education evolved with the digital age is virtual education that has influenced efficiency in today’s learning environments. Virtual learning has indeed proved its efficiency to overcome the drawbacks of the physical environment such as time, facilities, location, etc., but despite what it had accomplished, the educational system over all is not adequate for being a productive system yet. Earning a degree is not anymore enough to obtain a career job; it is simply missing the skills and creativity. There are always two sides of a coin; a college degree or a specialized certificate, each has its own merits, but having both can put you on a successful IT career path. For many of job-seeking individuals across world to have a clear meaningful goal for work and education and positively contribute the community, a productive correlation and cooperation among employers, universities alongside with the individual technical skills is a must for generations to come. Fortunately, the proposed research “Entrepreneur Universal Education System” is an evolution to meet the needs of both employers and students, in addition to gaining vital and real-world experience in the chosen fields is easier than ever. The new vision is to empower the education to improve organizations’ needs which means improving the world as its primary goal, adopting universal skills of effective thinking, effective action, effective relationships, preparing the students through real-world accomplishment and encouraging them to better serve their organization and their communities faster and more efficiently.
  • A Machine Learning Based Framework for Education Levelling in Multicultural Countries: UAE as a Case Study
    Authors: Shatha Ghareeb, Rawaa Al-Jumeily, Thar Baker, Keywords: Admissions, algorithms, cloud computing, differentiation, fog computing, leveling, machine learning. DOI:10.5281/zenodo. Abstract: In Abu Dhabi, there are many different education curriculums where sector of private schools and quality assurance is supervising many private schools in Abu Dhabi for many nationalities. As there are many different education curriculums in Abu Dhabi to meet expats’ needs, there are different requirements for registration and success. In addition, there are different age groups for starting education in each curriculum. In fact, each curriculum has a different number of years, assessment techniques, reassessment rules, and exam boards. Currently, students that transfer curriculums are not being placed in the right year group due to different start and end dates of each academic year and their date of birth for each year group is different for each curriculum and as a result, we find students that are either younger or older for that year group which therefore creates gaps in their learning and performance. In addition, there is not a way of storing student data throughout their academic journey so that schools can track the student learning process. In this paper, we propose to develop a computational framework applicable in multicultural countries such as UAE in which multi-education systems are implemented. The ultimate goal is to use cloud and fog computing technology integrated with Artificial Intelligence techniques of Machine Learning to aid in a smooth transition when assigning students to their year groups, and provide leveling and differentiation information of students who relocate from a particular education curriculum to another, whilst also having the ability to store and access student data from anywhere throughout their academic journey.
  • Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security
    Authors: Rosmini Yanti, Safira Aviolita, Marsetio, Keywords: Archipelago State, maritime law, maritime security, traffic separation scheme. DOI:10.5281/zenodo. Abstract: Indonesia has several straits that are very important as a shipping lane, including the Sunda Strait and the Lombok Strait, which are the part of the Indonesian Archipelagic Sea Lane (IASL). An increase in traffic on the Marine Archipelago makes the task of monitoring sea routes increasingly difficult. Indonesia has proposed the establishment of a Traffic Separation Scheme (TSS) in the Sunda Strait and the Lombok Strait and the country now has the right to be able to conceptualize the TSS as well as the obligation to regulate it. Indonesia has the right to maintain national safety and sovereignty. In setting the TSS, Indonesia needs to issue national regulations that are in accordance with international law and the general provisions of the IMO (International Maritime Organization) can then be used as guidelines for maritime safety and security in the Sunda Strait and the Lombok Strait. The research method used is a qualitative method with the concept of linguistic and visual data collection. The source of the data is the analysis of documents and regulations. The results show that the determination of TSS was justified by International Law, in accordance with article 22, article 41, and article 53 of the United Nations Convention on the Law of the Sea (UNCLOS) 1982. The determination of TSS by the Indonesian government would be in accordance with COLREG (International Convention on Preventing Collisions at Sea) 10, which has been designed to follow IASL. Thus, TSS can provide a function as a safety and monitoring medium to minimize ship accidents or collisions, including the warship and aircraft of other countries that cross the IASL.
  • Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
    Authors: B. O. Diyaolu, Keywords: Adequate Security, fans attendance, football fans, football stadium, Nigeria Professional Football League. DOI:10.5281/zenodo. Abstract: The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.
  • Investigation of the Physical Computing in Computational Thinking Practices, Computer Programming Concepts and Self-Efficacy for Crosscutting Ideas in STEM Content Environments
    Authors: Sarantos Psycharis, Keywords: STEM, computational thinking, physical computing, Arduino, Labview, self-efficacy. DOI:10.5281/zenodo. Abstract: Physical Computing, as an instructional model, is applied in the framework of the Engineering Pedagogy to teach “transversal/cross-cutting ideas” in a STEM content approach. Labview and Arduino were used in order to connect the physical world with real data in the framework of the so called Computational Experiment. Tertiary prospective engineering educators were engaged during their course and Computational Thinking (CT) concepts were registered before and after the intervention across didactic activities using validated questionnaires for the relationship between self-efficacy, computer programming, and CT concepts when STEM content epistemology is implemented in alignment with the Computational Pedagogy model. Results show a significant change in students’ responses for self-efficacy for CT before and after the instruction. Results also indicate a significant relation between the responses in the different CT concepts/practices. According to the findings, STEM content epistemology combined with Physical Computing should be a good candidate as a learning and teaching approach in university settings that enhances students’ engagement in CT concepts/practices.
  • The U.S. Missile Defense Shield and Global Security Destabilization: An Inconclusive Link
    Authors: Michael A. Unbehauen, Gregory D. Sloan, Alberto J. Squatrito, Keywords: Arms control, arms race, global security, GMD, ICBM, missile defense, proliferation. DOI:10.5281/zenodo.3299365 Abstract: Missile proliferation and global stability are intrinsically linked. Missile threats continually appear at the forefront of global security issues. North Korea’s recently demonstrated nuclear and intercontinental ballistic missile (ICBM) capabilities, for the first time since the Cold War, renewed public interest in strategic missile defense capabilities. To protect from limited ICBM attacks from so-called rogue actors, the United States developed the Ground-based Midcourse Defense (GMD) system. This study examines if the GMD missile defense shield has contributed to a safer world or triggered a new arms race. Based upon increased missile-related developments and the lack of adherence to international missile treaties, it is generally perceived that the GMD system is a destabilizing factor for global security. By examining the current state of arms control treaties as well as existing missile arsenals and ongoing efforts in technologies to overcome U.S. missile defenses, this study seeks to analyze the contribution of GMD to global stability. A thorough investigation cannot ignore that, through the establishment of this limited capability, the U.S. violated longstanding, successful weapons treaties and caused concern among states that possess ICBMs. GMD capability contributes to the perception that ICBM arsenals could become ineffective, creating an imbalance in favor of the United States, leading to increased global instability and tension. While blame for the deterioration of global stability and non-adherence to arms control treaties is often placed on U.S. missile defense, the facts do not necessarily support this view. The notion of a renewed arms race due to GMD is supported neither by current missile arsenals nor by the inevitable development of new and enhanced missile technology, to include multiple independently targeted reentry vehicles (MIRVs), maneuverable reentry vehicles (MaRVs), and hypersonic glide vehicles (HGVs). The methodology in this study encapsulates a period of time, pre- and post-GMD introduction, while analyzing international treaty adherence, missile counts and types, and research in new missile technologies. The decline in international treaty adherence, coupled with a measurable increase in the number and types of missiles or research in new missile technologies during the period after the introduction of GMD, could be perceived as a clear indicator of GMD contributing to global instability. However, research into improved technology (MIRV, MaRV and HGV) prior to GMD, as well as a decline of various global missile inventories and testing of systems during this same period, would seem to invalidate this theory. U.S. adversaries have exploited the perception of the U.S. missile defense shield as a destabilizing factor as a pretext to strengthen and modernize their militaries and justify their policies. As a result, it can be concluded that global stability has not significantly decreased due to GMD; but rather, the natural progression of technological and missile development would inherently include innovative and dynamic approaches to target engagement, deterrence, and national defense.
  • High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy
    Authors: F. Pagliara, F. Mauriello, Keywords: Tourists, overnights, high speed rail, attractions, security. DOI:10.5281/zenodo.3298641 Abstract: The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Conferences by Location