International Workshop on Trust in Cloud Computing – IWTCC 2018

The 3rd International Workshop on Trust in Cloud Computing

Collocated with 11th IEEE/ACM International Conference on Utility and Cloud Computing

December 17-20, 2018, Zurich, Switzerland


Call for papers

 Trust is a key requirement for the successful uptake and operation of Utility and Cloud Computing (UCC). Service consumers must have belief that their data is safe and protected and service providers must provide sufficient assurances to satisfy these beliefs. However many challenges need to be overcome before this is possible. A myriad of trust relationships can arise between the different players in the UCC service delivery chain and these need to be understood and described as do the consequential assurance approaches that may be required. Complex, and varying, UCC service delivery environments may require very different and context dependent mechanisms to provide the assurances needed. This workshop aims to explore approaches to the definition and establishment of trust relationships in a dynamic and evolving UCC service environment and to investigate mechanisms, methodologies and technologies to enable the provision of assurances that are needed to fulfil users trust beliefs.

The IWTCC will be held in Zurich, Switzerland in December, 2018. It provides a forum for researchers world-wide to present their latest work in privacy, security and trust in the cloud, and to show how this research can be used to enable innovation.


We encourage submissions on theoretical as well as experimental studies related to all aspects of trust and security and privacy in the cloud. Topics of interests include, but are NOT limited to, the following categories:

  • Trust models in UCC.
  • Cryptographic techniques for privacy preservation
  • Identity, Authentication and key management
  • Formal verification for cloud architecture
  • Practical cryptographic protocols for cloud security
  • Intrusion Detection Technologies for cloud contexts
  • SDN Security
  • Provenance and digital forensics
  • Monitoring systems in the cloud
  • Remote attestation mechanisms in clouds
  • Trusted computing technology and clouds
  • Cloud Integrity and Audit
  • Privacy and security in Vehicular cloud
  • Multi-tenancy and trust in cloud computing

Important dates

Paper Submissions Due:              20 August, 2018 (Extended)
Notification of Acceptance:         15 September, 2018
Camera ready version: 30 September, 2018

Organising committees

General chairs

Technical program committee

  • Ashiq Anjum, University of Derby, UK.
  • Rafael Timoteo De Sousa Junior, University of Brasilia, Brazil.
  • Christophe Bidan, Supelec, France.
  • Qi Shi, Liverpool John Moors University, UK.
  • Enda Fallen, Athlone Institute of Technology, Ireland.
  • Vasilis Katos, Bournemouth university, UK.
  • Ryan Ko, University of Waikato, New Zealand.
  • Khalid Al-Begain, KCST , Kuwait.
  • Lu Liu, University of Derby, UK.
  • Eric Filiol, ESIEA, France.
  • Sheikh Mahbub Habib, CASED, Darmstadt, Germany.
  • Ali Miri, Ryerson University, Canada.
  • Kim Smith, University of Derby, UK.
  • Maryline Laurent, Telecom SudParis, France.
  • Kaniz Fatema, University of Derby, UK
  • Khaled Salah, Khalifa University, UAE
  • Theo Lynn, Dublin City University, Ireland.
  • Bacem Bakhache, Lebanese university, Lebanon.
  • Nizar Kheir, Thales group
  • Kashif    Kifayat, Liverpool university
  • Nidal AlBeiruti, QA Consulting, UK
  • Alexis Mylonas, Bournemouth university, UK.
  • Mahmood Hosseini, Bournemouth university, UK.
  • Shamal Faily, Bournemouth university, UK.
  • Kevin Koidl, Trinity College, Dublin


Paper submission :

Submitted manuscripts should be structured as technical papers and may not exceed six (6) single-spaced double-column pages using 10-point size font on 8.5×11 inch pages (IEEE conference style), including figures, tables, and references. The proceedings will be published by the IEEE Computer Society and will be made available online through the IEEE Digital Library, as well as through the ACM Digital Library.

Authors should submit the manuscript in PDF format. All manuscripts will be reviewed and will be judged on correctness, originality, technical strength, rigour in analysis, quality of results, quality of presentation, and interest and relevance to the conference attendees.

Submitted papers must represent original unpublished research that is not currently under review for any other conference or journal.

Posted in Uncategorized | Leave a comment

Richard Self’s Conferences

I have contributed to many academic and business conferences over the years. The following pages provide the individual links to the videos and presentations for many  of the conferences.

2018 Conferences

2017 Conferences

2016 Conferences

2015 Conferences

2014 Conferences

2013 Conferences

2012 Conferences

And a few older ones for 2010 and 2010

Posted in Uncategorized | Leave a comment

Protected: I100 Computer Science Returning Students’ Induction (2017)

This content is password protected. To view it please enter your password below:

Posted in Uncategorized | Enter your password to view comments.

Visualising the Machine Learning Process

This item provides a compelling illustration of how machine learning can be developed.

Visualising Machine Learning, see also


Posted in Uncategorized | Leave a comment

We’ve Moved!

Computing and Mathematics have moved from Kedleston Road to Markeaton Street, and Electronics have new offices. We’re all in or near the new STEM area of the main Markeaton Street building.

Looking for a member of staff?  See the table below:

Staff Room
Adnane, Asma MS310
Andrade, Jose Manuel MS225
Anjum, Ashiq Markeaton Lodge
Bagdasar, Ovidiu MS229
Barnby, Lee MS229
Berry, Robert MS103
Bousbaine, Amar MS226
Chen, Minsi MS229
Conniss, Rich MS229
Dring, Mark MS228
Farid, Mohsen MS310
Franqueira, Virginia MS310
Hardy, James MS308
Hill, Adam MS228
Hunt, Roisin MS103
Kharaz, Ahmad MS225
Korpelainen, Nicholas MS229
Kurugollu, Fatih MS312
Lane, Phil MS231
Larcombe, Peter MS306
Lawson, Phil MS302
Le, Huirong MS312
Lewis, Simon MS228
Liu, Lu MS304
McDonald, Carlton MS226
McKenzie, Ian MS228
Mills, Barry MS225
Mitchell, Shane MS103
Morris, Phil MS103
Murtagh, Fionn MS312
Parkes, Chris MS229
Parkes, Dennis MS226
Pigden, Louise MS307
Redgate, John MS226
Rippin, Wayne MS308
Roberston-Begg, John MS226
Sams, Ben MS228
Self, Richard MS308
Shafik, Mahmoud MS225
Smith, Ash MS302
Smith, Kim MS303
Voorhis, Dave MS308
Whitbrook, Amanda MS310
Wiggins, Bruce MS228
Wilmhurst, Tim MS303
Wilson, David MS225
Windmill, Chris MS308
Xue, Yong MS231
Yang, Zhiyin MS312
Zhai, Xiaojun MS225
Zhu, Peggy MS310
Zoras, Stamatis MS306
Posted in Uncategorized | Leave a comment

Digital Forensics Workshop

Organised for students: Event @ Derby 14-15 Feb 2017

Posted in Uncategorized | Leave a comment

Special issue on Cloud Forensics and Security (Journal of Cloud Computing, SpringerOpen)

Posted in Cybercrime, Digital Forensics, Security | Leave a comment

ODBMS Q&A with Data Scientists Interview

See for the first interview in the ODBMS Q&A with Data Scientists series that I gave on 15 Nov 2016.

This interview comments on aspects of Data Science such as Machine Learning, Predictive Modelling, Data Blending and Data Ingestion into analytical systems.

Posted in Artificial Intelligence, Big Data, Business Value, Cognitive Computing, Data Analytics, Data Science, Governance, Machine Learning, Richard Self | Leave a comment

1st Workshop on The Human Side of Cybersecurity

The Human Side of Cybersecurity: assessment, measurement and modelling (HuSCy:ASM16)

Collocated with 9th IEEE/ACM International Conference on Utility and Cloud Computing

December 6-9, 2016

Tongji University – Shanghai, China

 Call for papers

This workshop intends to pay a closer look into the concept of securing end users as they interact with today’s online technologies. Understanding users’ behaviour in the context of how they are manipulated within the norms and practices of their ecosystems as opposed to technologies in place to provide the protection is the central issue for this workshop. As humans need to be at the centre of such secure systems, the need to understand the characteristics of the interaction between humans and systems is evident. The human aspects of the interaction with systems is predominately visual, auditory and textual. The need to understand how humans fail to secure themselves and protect their well-being is paramount. To constrain a product confines innovation considerably and unexpected and unplanned use of technology has merits, hence security needs to be integrated within technologies to pre-empt possible cyberattacks. Such technologies need to learn and embed user behaviours and learn the ever changing face of cyberattacks.

The scope of this workshop encourages researchers in the areas of cybersecurity, data mining, natural text processing, machine learning, HCI, cognitive psychology, sensors (eye tracking, EEG, ECG, etc.), neuroscience, game theory, criminology and law among others to contribute to this important and evolving area of research.

Authors of best papers accepted for the conference will be encouraged to submit expanded versions of the papers to be included in an edited book by Springer shortly after the conference.

Important dates and Submission

  • Paper Submissions Due:                15th August, 2016
  • Notification of Acceptance:           10th September, 2016
  • Early Registration Deadline:         21st September, 2016

Paper Submission:

Authors are encouraged to submit high-quality, original work that has neither appeared in, nor is under consideration by, other conferences and journals.

The length of the papers should not exceed 6 pages (IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced), including figures and references, using font size 10, and number each page. All papers will be peer reviewed and the comments will be provided to the authors. The accepted papers will be published in the main proceedings of the IEEE/ACM UCC 2016 by the IEEE Computer Society Press and indexed by EI. At least one of the authors of their accepted paper is requested to register the paper and present the work in the IEEE/ACM UCC 2016.

IEEE Computer Society Proceedings template is available at:

Submission will be handled through EasyChair. Please find the submission link:


Posted in Uncategorized | Leave a comment

CLOUDFOR 2016: Workshop on Cloud Forensics

To be held at UCC in Shanghai, China; 6-9 December 2016.

Posted in Uncategorized | Leave a comment