posted by user: jxl || 8505 views || tracked by 26 users: [display]

TSP 2009 : The 2009 IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications

FacebookTwitterLinkedInGoogle

Link: http://trust.csu.edu.cn/conference/tsp2009/
 
When Oct 5, 2009 - Oct 7, 2009
Where Macau SAR, China
Submission Deadline May 31, 2009
Notification Due Jun 30, 2009
Final Version Due Jul 31, 2009
Categories    trust   security   privacy   pervasive application
 

Call For Papers

Introduction

Pervasive Computing (or ubiquitous computing) is a rapidly developing research area cross various disciplines including computer science, electronic engineering, mobile and wireless communications, etc. The growing availability of microprocessors with built-in communications facilities makes it possible for people to obtain information and services anytime and anywhere. Pervasive computing could have a range of applications such as healthcare, homecare, intelligent transportation, and environmental monitoring. However, it is quite difficult for pervasive applications to satisfy trust, security and privacy requirements, as a result of their ability to gather sensitive data and change the environment via actuating devices autonomously.


Following the success of TSP 2008 in Shanghai, China during December 17-20, 2008, the 2009 IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-09) will be held in Macau SAR, China during October 5-7, 2009, in conjunction with The 2009 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2009), aims at bringing together researchers and practitioners in the world working on trust, security, privacy, and related issues such as technical, social and cultural implications for pervasive devices, services, networks, applications and systems, and providing a forum for them to present and discuss emerging ideas and trends in this highly challenging research area.


Scope and Interests

TSP-09 is an international forum for presenting and discussing emerging ideas and trends in trust, security and privacy for pervasive applications from both the research community as well as the industry. Topics of interest include, but are not limited to:

(1) Trust, Security and Privacy (TSP) metrics and architectures for pervasive computing
(2) Trust management in pervasive environment
(3) Risk management in pervasive environment
(4) Security and privacy protection in pervasive environment
(5) Security and privacy in mobile and wireless communications
(6) Security and privacy for databases in pervasive environment
(7) Safety and user experiences in pervasive environment
(8) TSP-aware social and cultural implications in pervasive environment
(9) Cryptographic devices for pervasive computing
(10) Biometric authentication for pervasive devices
(11) Security for embedded software and systems
(12) TSP-aware middleware design for pervasive services
(13) TSP-aware case studies on pervasive applications/systems
(14) Key management in pervasive applications/systems
(15) Authentication in pervasive applications/systems
(16) Audit and accountability in pervasive applications/systems
(17) Access control in pervasive applications/systems
(18) Anonymity in pervasive applications/systems
(19) Reliability and fault tolerance in pervasive applications/systems
(20) Miscellaneous issues in pervasive devices, services, applications, and systems


Submission and Publication Information

The accepted papers from this symposium will be published by IEEE Computer Society in IEEE MASS-09 symposium/workshop proceedings (indexed by EI Compendex and ISTP). Papers should be written in English conforming to the IEEE standard conference format (8.5" x 11", Two-Column) [http://www.computer.org/portal/pages/cscps/cps/cps_forms.html]. Papers should be submitted through the paper submission system at the symposium website [http://trust.csu.edu.cn/conference/tsp2009/submission]. Each paper is limited to 6 pages (or 8 pages with over length charge). Distinguished papers, after further revisions, will be published in a special issue of The Journal of Supercomputing (Springer) to be indexed by SCI (pending). The program committee will select one winner for the Best Paper Award for this symposium. Submitting a paper to the symposium means that, if the paper is accepted, at least one author should attend the symposium and present the paper. For no-show authors, their papers will be removed from the digital library after the symposium and their affiliations will be notified.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
S&P 2025   The 45th IEEE Symposium on Security and Privacy
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
CSW 2024   2024 3rd International Conference on Cyber Security
BDCAT 2024   IEEE/ACM Int’l Conf. on Big Data Computing, Applications, and Technologies
JoL 2024   International Journal of Law
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)