posted by user: jmseigneur || 7994 views || tracked by 14 users: [display]

ACM-SAC-TRECK 2011 : ACM SAC'11 Trust/Reputation track

FacebookTwitterLinkedInGoogle

Link: http://www.trustcomp.org/treck/
 
When Mar 21, 2011 - Mar 25, 2011
Where Taichung, Taiwan
Submission Deadline Aug 24, 2010
Notification Due Oct 12, 2010
Final Version Due Nov 2, 2010
Categories    trust   security   reputation   computing
 

Call For Papers

(We apologize if you receive multiple copies of this message)

CALL FOR PAPERS - SAC 2011

The 26th ACM Symposium on Applied Computing
at TaiChung, Taiwan
http://www.acm.org/conferences/sac/sac2011/

Track: Trust, Reputation, Evidence and other Collaboration Know-how (TRECK)

Proceedings: ACM printed form, ACM CD-ROM and ACM digital library, possible follow-up Journal issue, e.g., was Applied Computing Review in 2010

Aims and scope of the TRECK track:

Computational models of trust and online reputation mechanisms have been gaining momentum. The ACM SAC 2005, 2006, 2007, 2008, 2009 and 2010 TRECK tracks attracted researchers from both academia and industry who have joined an online group at http://tech.groups.yahoo.com/group/trustcomp/

The goal of the ACM SAC 2011 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust/reputation applications, especially those used in real-world applications.

The topics of interest include, but are not limited to:
Trust management, reputation management and identity management
Pervasive computational trust and use of context-awareness
Mobile trust, context-aware trust
Web 2.0 reputation and trust
Trust-based collaborative applications
Automated collaboration and trust negotiation
Trade-off between privacy and trust
Trust/risk-based security frameworks
Combined computational trust and trusted computing
Tangible guarantees given by formal models of trust and risk
Trust metrics assessment and threat analysis
Trust in peer-to-peer and open source systems
Technical trust evaluation and certification
Impacts of social networks on computational trust
Evidence gathering and management
Real-world applications, running prototypes and advanced simulations
Applicability in large-scale, open and decentralised environments
Legal and economic aspects related to the use of trust and reputation engines
User-studies and user interfaces of computational trust and online reputation applications


Submission guidelines are posted on the TRECK 2011 Web site (http://www.trustcomp.org/treck/), which always contains the latest updates.

Authors are invited to submit full papers about original and unpublished research. A paper cannot be submitted to more than one track. We would like to encourage the submission of industrial experience reports and reports of innovative applications.

The body of each paper should not exceed 6,000 words. The standard paper is 6 ACM pages long and 2 extra ACM pages may be added.

Submissions should be properly anonymized to facilitate blind reviewing.
At least three reviewers will be assigned to each submission to the TRECK track.


IMPORTANT DUE DATES
Aug. 24, 2010: Full paper submission
Oct. 12, 2010: Author notification
Nov. 2, 2010: Camera-ready copy
Mar. 21-25, 2011: ACM SAC in Taiwan

Track Program Chair:
Jean-Marc Seigneur, University of Geneva, Switzerland

Program Committee:
* Sun Yan Lindsay, University of Rhode Island, USA
* Stephen Marsh, National Research Council of Canada
* Zheng Yan, Nokia Research, Finland
* Wanita Sherchan, CSIRO ICT Centre, Australia
* Rafael Timóteo de Sousa Júnior, University of Brasília, Brazil
* Sebastian Ries, Technische Universitaet Darmstadt, Germany
* Fabio Martinelli, National Research Council, Pisa, Italy
* Victor Grishchenko, Ural State University, Russia
* Anthony Meehan, Open University, UK
* Uwe Roth,Centre de Recherche Public Henri Tudor (CRP Henri Tudor), Luxembourg
* Mario Paolucci, ISTC-CNR, Roma, Italy
* Yanjun Zuo, University of North Dakota, USA
* Mawloud Omar, Bejaia University, Algeria
* Sotirios Terzis, University of Strathclyde, UK
* Cai-Nicolas Ziegler, University of Freiburg, Germany
* Gabriele Lenzini, University of Luxembourg

(please check the Web site http://www.trustcomp.org/treck/ )

Related Resources

KLP@SAC 2019   Knowledge and Language Processing Track @ The 34th ACM Symposium on Applied Computing - ACM SAC 2019
ACM-ACAI-Ei/Scopus 2019   2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
SP 2020   IEEE Symposium on Security and Privacy
KomIS@ACM-SAC 2019   ACM SAC 2019 - KomIS track: Application of AI and Big Data Analytics
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
UMAP 2020   ACM International Conference on User Modeling, Adaptation and Personalization
ACM--ICMLC--Ei and Scopus 2020   ACM--2020 12th International Conference on Machine Learning and Computing (ICMLC 2020)--SCOPUS, Ei Compendex
BIOTC--ACM, Ei and Scopus 2020   ACM--2020 2nd Blockchain and Internet of Things Conference (BIOTC 2020)--Ei Compendex, Scopus
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G