| |||||||||||||
TrustCom 2010 : Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications | |||||||||||||
Link: http://trust.csu.edu.cn/conference/trustcom2010/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Call for Papers for the Sixth IEEE/IFIP International
Symposium on Trusted Computing and Communications (TrustCom-10) Organizer: Trusted Computing Institute, Central South University, China Venue & Dates: Hong Kong SAR, China, December 11-13, 2010 http://trust.csu.edu.cn/conference/trustcom2010 To be held in conjunction with The Eighth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-10) http://www.euc2010.org/ Introduction With the rapid development and the increasing complexity of computer and communications systems and networks, traditional security technologies and measures can not meet the demand for integrated and dynamic security solutions. As a challenging and innovative research field, trusted computing and communications target computer and communications systems and networks that are available, secure, reliable, controllable, dependable, and so on. In a word, they must be trustworthy. If we view the traditional security as identity trust, the broader field of trusted computing and communications also includes behavior trust of systems and networks. In fact, trusted computing and communications have become essential components of various distributed services, applications, and systems, including ad-hoc networks, peer-to-peer networks, social networks, semantic webs, e-commence, e-government, pervasive, ubiquitous, and cyber-physical systems. The Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10) will be held in conjunction with "The Eighth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-10)". It follows the success of TrustCom-09 in Vancouver, Canada, TrustCom-08 in Zhangjiajie, China, SNDS-07 in Niagara Falls, Canada, SNDS-06 in Vienna, Austria, and SNDS-05 in Fukuoka, Japan. It aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to security, safety, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field. Scope and Interests TrustCom-10 is an international forum for presenting and discussing emerging ideas and trends in trusted computing and communications in computer systems and networks from both the research community as well as the industry. Topics of interest include, but are not limited to: (1) Trust semantics, metrics, and models (2) Trust inference, computation, and combination (3) Trusted computing platform (4) Trusted network computing (5) Trusted operating systems (6) Trusted software (7) Trusted database (8) Trusted services and applications (9) Trusted communications (10) Trust in e-commerce and e-government (11) Trust in mobile and wireless networks (12) Reliable and fault-tolerant computer systems/networks (13) Survivable computer systems/networks (14) Cryptography and security protocols (15) Authentication in computer systems/networks (16) Access control in computer systems/networks (17) Key management in computer systems/networks (18) Anonymity and privacy in computer systems/networks (19) Trust in emerging applications (20) Miscellaneous trust issues Submission and Publication Information The accepted papers from this symposium will be published by IEEE Computer Society in IEEE EUC-10 proceedings (indexed by EI Compendex and ISTP). Papers should be written in English conforming to the IEEE standard conference format(8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the symposium website. Manuscripts should be submitted through the paper submission system at the symposium website. Each paper is limited to 6 pages (or 8 pages with the over length charge). Distinguished papers, after further revisions, will be published in a special issue of Elsevier’s Computer and Communications (COMCOM), to be indexed by both SCI and EI. The program committee will select one winner for the Best Paper Award for this symposium. Submitting a paper to the symposium means that, if the paper is accepted, at least one author should attend the symposium and present the paper. For no-show authors, their papers will be removed from the digital library after the symposium and their affiliations will be notified. --- Past Special Issues: TrustCom 2009 SI: Elsevier’s Journal of Network and Computer Applications (JNCA), both SCI and EI indexed. TrustCom 2008 SI: Wiley’s Security and Communication Networks (SCN), both SCI and EI indexed. --- Important Dates (1) Paper submission due: July 9, 2010 (2) Notification of decision: September 6, 2010 (3) Camera-ready papers due: October 4, 2010 General Co-Chairs Jie Wu, Temple University, USA Srinivas Sampalli, Dalhousie University, Canada Program Co-Chairs Helen Y. Tang, Defence Research & Development Canada–Ottawa, Canada Xinwen Fu, University of Massachusetts Lowell, USA Program Committee (in alphabetical order) Adel Cherif, Qatar University, Qatar Akashi Aggarwal, University of Windsor, Canada Avinash Srinivasan, Bloomsburg University, USA Benjamin Fabian, Humboldt-Universit?t, zu Berlin, Germany Bin Lu, West Chester University of Pennsylvania, USA Bin Tang, Wichita State University, USA Bin Xiao, Hong Kong Polytechnic University, Hong Kong Chin-Tser Huang, University of South Carolina, USA Christian Callegari, University of Pisa, Italy Cliff Zou, University of Central Florida, USA Constantinos Lambrinoudakis, University of Piraeus, Greece David Chadwick, University of Kent, UK Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China Dong Seong Kim, Duke University, USA Dong Xiang, Tsinghua University, China El-Sayed El-Alfy, King Fahd University of Petroleum and Minerals, Saudi Arabia Emmanuelle Anceaume, IRISA, France Fang Qi, Central South University, China Farid Na?t-Abdesselam, University of Lille, France Gang Li, Institute of Computing Technology, Chinese Academy of Sciences, China Gaocai Wang, Hunan University, China Gianluigi Me, University of Rome "Tor Vergata", Italy Gregorio Martinez, University of Murcia (UMU), Spain Hai Jiang, Arkansas State University, USA Ioannis Broustis, Alcatel-Lucent, USA Jean-Marc Seigneur, University of Geneva, Switzerland Jemal Abawajy, Deakin University, Australia Jian Ren, Michigan State University East Lansing, USA Jian Yu, University of Adelaide, Australia Jianxun Liu, Hunan University of Science and Technology, China Jin-Hee Cho, U.S. Army Research Laboratory, USA Jinhua Xiong, Institute of Computing Technology, Chinese Academy of Sciences, China Jinzhao Wu, Beijing Jiaotong University, China Jun Shen, University of Wollongong, Australia Justin Zhan, Carnegie Mellon CyLab, Japan Kaiqi Xiong, North Carolina State University, USA Kenji Saito, Keio University, Japan Khaled Salah, King Fahd University of Petroleum & Minerals, Saudi Arabia Maoyu Wang, Communication Research Center Canada, Canada Marco Aiello, University of Groningen, The Netherlands Marten J. Van Sinderen, Universty of Twente, The Netherlands Meng Yu, Western Illinois University, USA Mohamed Hamdi, University of Carthage, Tunisia Mohamed Moustafa, Akhbar El Yom Academy, Egypt N. Jaisankar, VIT University, India Nan Zhang, George Washington University, USA Nicolas Sklavos, Technological Educational Institute of Patras, Greece Paolo Falcarin, Politecnico di Torino, Italy Peter Bertok, RMIT University, Australia Qiang Ye, University of Prince Edward Island, Canada Qijun Gu, Texas State University at San Marcos, USA Rajendra V. Boppana, University of Texas, USA Richard Yu, Carleton University, Canada Ruixuan Li, Huazhong University of Science and Technology, China Sajid Hussain, Fisk University, USA Sanjeev Kumar, University of Texas - Pan American, USA Song Han, Curtin University of Technology, Australia Steve Graham, Dakota State University, USA Suthikshn Kumar, PES Institute of Technology, India Wei Jie, University of Manchester, UK Wei Yu, Towson University, USA Weigang Wu, Sun Yat-Sen University, China Xiaolei Dong, Shanghai Jiao Tong University, China Xiangyang Li, Illinois Institute of Technology, USA Yafei Yang, Qualcomm Inc., USA Yan Zhang, Simula Research Laboratory, Norway Yanjiang Yang, Institute for Infocomm Research, Singapore Yeong-Deog Kim, Woosong University, Korea Yi Mu, University of Wollongong, Australia Yihui Tang, MicroStrategy Inc., USA Yingying Chen, Stevens Institute of Technology, USA Yong Zhang, Liaoning Normal University, China Young-Sik Jeong, WonKwang University, Korea Yu Chen, State University of New York, USA Zhe Tang, Central South University, China Zhiquan (George) Zhou, University of Wollongoong, Australia Zili Shao, Hong Kong Polytechnic University, Hong Kong Steering Committee Guojun Wang, Central South University, China (Chair) Laurence T. Yang, St. Francis Xavier University, Canada (Chair) Hsiao-Hwa Chen, National Cheng Kung University, Taiwan Jiannong Cao, Hong Kong Polytechnic University, Hong Kong Jie Wu, Temple University, USA Kouichi Sakurai, Kyushu University, Japan Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain Minyi Guo, Shanghai Jiao Tong University, China Peter Mueller, IBM Zurich Research Laboratory, Switzerland Weijia Jia, City University of Hong Kong, Hong Kong Publicity Co-Chairs Alberto Sanchez, Universidad Rey Juan Carlos, Madrid, Spain Guang Gong, University of Waterloo, Canada Hamid Mehrvar, Nortel, Canada Hejun Wu, Sun Yat-Sen University, China Matthew Wright, University of Texas at Arlington, USA Shuhui Yang, Purdue University Calumet, USA Secretariat Feng Yan, Central South University, China Webmaster Qiushuang Du , Central South University, China Contact Please email inquiries concerning TrustCom 2010 to: Prof. Guojun Wang: csgjwang AT gmail DOT com |
|