Hardware security and Side Channels
Securing Machine Learning in the Cloud
Trusted execution and confidential computing
Virtual machine and container security
Accountability & auditing
Authentication & authorization
Blockchain Cloud services
Cryptography in the Cloud
Hypervisor security
Identity management & security as a service
Prevention of data loss or leakage
Secure, interoperable identity management
Trust & credential management
Trust models for Cloud services
Usable security risk management in Cloud computing environments
Privacy protection in Cloud platforms
Privacy policy framework in the Cloud
Privacy-preserving data mining in the Cloud
Information sharing and data protection in the Cloud
Cryptographic protocols against internal attacks in the Cloud
Energy, cost, efficiency of security in the Cloud