posted by user: jmseigneur || 11127 views || tracked by 14 users: [display]

ACM-SAC-TRECK 2011 : ACM SAC'11 Trust/Reputation track

FacebookTwitterLinkedInGoogle

Link: http://www.trustcomp.org/treck/
 
When Mar 21, 2011 - Mar 25, 2011
Where Taichung, Taiwan
Submission Deadline Aug 24, 2010
Notification Due Oct 12, 2010
Final Version Due Nov 2, 2010
Categories    trust   security   reputation   computing
 

Call For Papers

(We apologize if you receive multiple copies of this message)

CALL FOR PAPERS - SAC 2011

The 26th ACM Symposium on Applied Computing
at TaiChung, Taiwan
http://www.acm.org/conferences/sac/sac2011/

Track: Trust, Reputation, Evidence and other Collaboration Know-how (TRECK)

Proceedings: ACM printed form, ACM CD-ROM and ACM digital library, possible follow-up Journal issue, e.g., was Applied Computing Review in 2010

Aims and scope of the TRECK track:

Computational models of trust and online reputation mechanisms have been gaining momentum. The ACM SAC 2005, 2006, 2007, 2008, 2009 and 2010 TRECK tracks attracted researchers from both academia and industry who have joined an online group at http://tech.groups.yahoo.com/group/trustcomp/

The goal of the ACM SAC 2011 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust/reputation applications, especially those used in real-world applications.

The topics of interest include, but are not limited to:
Trust management, reputation management and identity management
Pervasive computational trust and use of context-awareness
Mobile trust, context-aware trust
Web 2.0 reputation and trust
Trust-based collaborative applications
Automated collaboration and trust negotiation
Trade-off between privacy and trust
Trust/risk-based security frameworks
Combined computational trust and trusted computing
Tangible guarantees given by formal models of trust and risk
Trust metrics assessment and threat analysis
Trust in peer-to-peer and open source systems
Technical trust evaluation and certification
Impacts of social networks on computational trust
Evidence gathering and management
Real-world applications, running prototypes and advanced simulations
Applicability in large-scale, open and decentralised environments
Legal and economic aspects related to the use of trust and reputation engines
User-studies and user interfaces of computational trust and online reputation applications


Submission guidelines are posted on the TRECK 2011 Web site (http://www.trustcomp.org/treck/), which always contains the latest updates.

Authors are invited to submit full papers about original and unpublished research. A paper cannot be submitted to more than one track. We would like to encourage the submission of industrial experience reports and reports of innovative applications.

The body of each paper should not exceed 6,000 words. The standard paper is 6 ACM pages long and 2 extra ACM pages may be added.

Submissions should be properly anonymized to facilitate blind reviewing.
At least three reviewers will be assigned to each submission to the TRECK track.


IMPORTANT DUE DATES
Aug. 24, 2010: Full paper submission
Oct. 12, 2010: Author notification
Nov. 2, 2010: Camera-ready copy
Mar. 21-25, 2011: ACM SAC in Taiwan

Track Program Chair:
Jean-Marc Seigneur, University of Geneva, Switzerland

Program Committee:
* Sun Yan Lindsay, University of Rhode Island, USA
* Stephen Marsh, National Research Council of Canada
* Zheng Yan, Nokia Research, Finland
* Wanita Sherchan, CSIRO ICT Centre, Australia
* Rafael Timóteo de Sousa Júnior, University of Brasília, Brazil
* Sebastian Ries, Technische Universitaet Darmstadt, Germany
* Fabio Martinelli, National Research Council, Pisa, Italy
* Victor Grishchenko, Ural State University, Russia
* Anthony Meehan, Open University, UK
* Uwe Roth,Centre de Recherche Public Henri Tudor (CRP Henri Tudor), Luxembourg
* Mario Paolucci, ISTC-CNR, Roma, Italy
* Yanjun Zuo, University of North Dakota, USA
* Mawloud Omar, Bejaia University, Algeria
* Sotirios Terzis, University of Strathclyde, UK
* Cai-Nicolas Ziegler, University of Freiburg, Germany
* Gabriele Lenzini, University of Luxembourg

(please check the Web site http://www.trustcomp.org/treck/ )

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM ICVARS 2025   ACM--2025 9th International Conference on Virtual and Augmented Reality Simulations (ICVARS 2025)
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
SIGIR 2025   The 48th International ACM SIGIR Conference on Research and Development in Information Retrieval
ACM ICSCA 2025   ACM--2025 14th International Conference on Software and Computer Applications (ICSCA 2025)
ICoSSE 2025   CPS--2025 8th International Conference on Software and System Engineering (ICoSSE 2025)