posted by organizer: dogangulus || 6581 views || tracked by 7 users: [display]

ISDFS 2016 : Special Session on Trust, 4th IEEE International Symposium on Digital Forensics and Security

FacebookTwitterLinkedInGoogle

Link: http://bweb.host.ualr.edu/pages/1029/Special-Sessions/
 
When Apr 25, 2016 - Apr 27, 2016
Where Little Rock, Arkansas
Submission Deadline Dec 18, 2015
Notification Due Feb 22, 2016
Final Version Due Mar 4, 2016
Categories    trust   security   network   privacy
 

Call For Papers

Call for papers: Special session on Trust at ISDFS 2016

IEEE Technically Sponsored 4th International Symposium on Digital Forensics and Security (ISDFS 2016). 25-27 April 2016, Little Rock, Arkansas - http://www.isdfs.org

DESCRIPTION:

Trust has been a research area in social sciences for a long time however it is a new area in computing motivated by trust models for e-commerce. Trust is an open and challenging research area.

Trusted computing methods consistently outperformed previous generations of cryptographic techniques in domains where computation and energy resources are limited. They provide a flexible and expressive security framework that has been successfully applied to a wide range of real world problems.

Due to the current emerging problems of privacy, the new generation of trust algorithms and architectures are expected to solve increasingly challenging security problems. This must be done under growing constraints such as computational resources, memory budget and energy consumption. For these reasons, new ideas have to come up in the field of trusted computing, such as novel algorithms, to fill the gap that now exists with the most recent trust paradigms.

The purpose of this special session is to highlight recent advances in Trust. In particular, this session welcomes contributions toward the solution of the weaknesses (e.g. scalability, computational efficiency) and the improvement of the strengths (e.g. the ability of dealing with limited resources) of the state of the art Trust methods. We also encourage the submission of new theoretical results in the statistical aspects of Trust and innovative solutions to real world problems.
In particular, topics of interest include, but are not limited to:
- Trust semantics, metrics and models
- Trusted computing platform

- Trusted network computing

- Trusted operating systems

- Trusted software and applications

- Trust in social networks

- Trust in e-commerce and e-government

- Trust in mobile and wireless communications

- Risk and reputation management

- Survivable computer systems/networks

- Trust of 5G

- Miscellaneous trust issues
- Trust in cloud computing 

- Privacy, trust and big data 

- Trustworthiness in social networking services and social media
- Identity Management and Trust 

- Anonymity, privacy and accountability 

- Identity and personal information brokering 

- Legal aspects
- Pervasive and trusted platforms and infrastructure
- Security-, privacy-, and trust-enhancing technologies
- Trustworthy infrastructure for content delivery networks
- Trust in ubiquitous applications and services: connected vehicles, healthcare, homes, etc.
- Trust in cloud computing
- Privacy, trust and big data
- Trustworthiness in social networking services and social media
- Trustworthy location-based services
- Trust-based and trust-aware policy managements in various domains
- Trust in social networks and emerging contexts
- Trust in collaborative applications, crowd-sourcing and wiki systems
- Case studies and applications
- Trust, control and reputation effects in social networking
- Architectures and models of trust and reputation systems
- Trust metrics and computation
- Secure, trustworthy and privacy-aware systems, platforms and standards, software and services
- Trust in Cloud environments
- Large Identity Management Systems like UID/SSN, Banks, Mobile user groups
- Trust management for large user groups including machines and humans
- Applications to relevant Real-World Problems

SUBMISSION:
Prospective authors must submit their paper following the instructions provided in “Paper Submission” link of the conference website.

Each paper will undergo a peer reviewing process for its acceptance. Authors should send as soon as possible an e-mail with the tentative title of their contribution to the special session organizers.

IMPORTANT DATES:
Paper submission deadline: 18 December 2015, 11:59pm CST
Notification of acceptance: February 1, 2016 CST
The ISDFS 2016 conference: 25-27 April 2016

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ISDFS 2025   13th International Symposium on Digital Forensics and Security
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ICICN 2025   2025 IEEE 13th International Conference on Information and Communication Networks (ICICN 2025)
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
DFRWS USA 2025   Digital Forensics Research Conference USA