2008-04-28

[Mycolleagues] [TrustCom'08] International Symposium on Trusted Computing - Call for Papers


                         Call for Papers for
       The 2008 International Symposium on Trusted Computing
                           (TrustCom 2008)

   Trusted Computing Institute, Central South University, China
           Zhang Jia Jie, China, November 18-20, 2008
        http://trust.csu.edu.cn/conference/trustcom2008

To be held in conjunction with The 9th International Conference for Young
Computer Scientists (ICYCS 2008), and in cooperation with the IEEE.


Introduction

The 2008 International Symposium on Trusted Computing (TrustCom 2008), to be
held in conjunction with the 9th International Conference for Young Computer
Scientists (ICYCS 2008), aims at bringing together researchers and
practitioners in the world working on trusted computing with regard to
security, safety, privacy, reliability, dependability, survivability,
availability, and fault tolerance aspects of computer systems and networks,
and providing a forum for them to present and discuss emerging ideas and
trends in this highly challenging research field.


Scope and Interests

TrustCom 2008 is an international forum for presenting and discussing emerging
ideas and trends in trusted computing in computer systems and networks from
both the research community as well as the industry. Topics of interest
include, but are not limited to:
(1) Semantics, metrics and models of trust
(2) Trust establishment, propagation, and management
(3) Trusted computing platform
(4) Trusted network computing
(5) Trusted operating system
(6) Trusted software
(7) Trusted database
(8) Trusted services and applications
(9) Trust in e-commerce and e-government
(10) Trust in mobile and wireless networks
(11) Cryptography and security protocols
(12) Reliable and fault-tolerant computer systems/networks
(13) Survivable computer systems/networks
(14) Authentication in computer systems/networks
(15) Access control in computer systems/networks
(16) Key management in computer systems/networks


Submission and Publication Information

The symposium proceedings will be published by the IEEE Computer Society (will
be indexed by EI Compendex & ISTP). Manuscripts should be written in English
conforming to the IEEE standard conference format (8.5" x 11", Two-Column)
[http://www.computer.org/portal/pages/cscps/cps/cps_forms.html]. Manuscripts
should be submitted through the paper submission system at the symposium
website [http://trust.csu.edu.cn/conference/trustcom2008/submission]. Each
accepted paper is limited to 6 pages (or 8 pages with over length charge).
Distinguished papers, after further revisions, will be published in a special
issue of Wiley journal: Security and Communication Networks
(http://www.interscience.wiley.com/security). The program committee will
select one winner for the Best Paper Award for the symposium. Submission of a
paper should be regarded as a commitment such that, if accepted, at least one
author of the paper will register and attend the symposium; otherwise, it will
be removed from the IEEE Digital Library after the symposium.


Important Dates

(1) Paper submission due:      June 15, 2008
(2) Notification of decision:  July 15, 2008
(3) Camera-ready papers due:   August 1, 2008


General Co-Chairs

Weijia Jia, City University of Hong Kong, Hong Kong
Kouichi Sakurai, Kyushu University, Japan
Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan


Program Co-Chairs

Guojun Wang, Central South University, China
Chang-Ai Sun, Beijing Jiao Tong University, China
Bin Xiao, Hong Kong Polytechnic University, Hong Kong


Steering Co-Chairs

Laurence T. Yang, St. Francis Xavier University, Canada
Minyi Guo, Shanghai Jiao Tong University, China
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong


Publicity Co-Chairs

Yan Zhang, Simula Research Laboratory, Norway
Baoliu Ye, Nanjing University, China
Peter Mueller, IBM Zurich Research Laboratory, Switzerland


Secretariat

Yueming Deng, Central South University, China


Program Committee (in alphabetical order)

Adel Cherif, Qatar University, Qatar
Carlos Baladron, University of Valladolid, Spain
Dafang Zhang, Hunan University, China
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Deqing Zou, Huazhong University of Science & Technology, China
Dong Xiang, Tsinghua University, China
Dongyang Long, Sun Yat-Sen University, China
Emmanuelle Anceaume, IRISA, France
Fang Qi, Central South University, China
Feng Bao, Institute for Infocomm Research, Singapore
Gang Li, Institute of Computing Technology, Chinese Academy of Sciences, China
Geyong Min, University of Bradford, UK
Gianluca Ramunno, Politecnico di Torino, Italy
Helen Yiqun Tang, Defence Research & Development Canada ¨C Ottawa, Canada
Jean-Marc Seigneur, University of Geneva, Switzerland
Ji Wu, Beihang University, China
Jian Yu, Politecnico di Torino, Italy
Jianhua Ma, Hosei University, Japan
Jie Li, University of Tsukuba, Japan
Jie Wu, National Science Foundation, USA
Jinhua Xiong, Institute of Computing Technology, Chinese Academy of Sciences, China
Jinzhao Wu, Beijing Jiaotong University, China
Jun Shen, University of Wollongong, Australia
Kai-Yuan Cai, Beihang University, China
Kenji Saito, Keio University, Japan
Keqiu Li, Dalian University of Technology, China
Liudong Xing, University of Massachusetts Dartmouth, USA
Marco Aiello, University of Groningen, the Netherlands
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Madrid, Spain
Marten J. Van Sinderen, Universty of Twente, the Netherlands
Masumi Toyoshima, Kitakyushu University, Japan
Mieso Denko, University of Guelph, Canada
Paolo Falcarin, Politecnico di Torino, Italy
Sanglu Lu, Nanjing University, China
Sy-Yen Kuo, National Taiwan University, Taiwan
Tai Xin, Microsoft Corporation, USA
Weiping Wang, Central South University, China
Wenbin Jiang, Huazhong Univ. of Science and Technology, China
Wing-Kwong Chan, City University of Hong Kong, Hong Kong
Xiaolin (Andy) Li, Oklahoma State University, USA
Xiaoying Bai, Tsinghua University, China
Yanbo Han, Institute of Computing Technology, Chinese Academy of Sciences, China
Yi Mu, University of Wollongong, Australia
Young-Sik Jeong, WonKwang University, Korea
Yuzhong Sun, Institute of Computing Technology, Chinese Academy of Sciences, China
Zhiguang Qin, University of Electronic Science and Technology of China, China
Zhiquan Zhou, University of Wollongoong, Australia
Zili Shao, Hong Kong Polytechnic University, Hong Kong


Contact

Please email inquiries concerning TrustCom 2008 to: Prof. Guojun Wang
Email: csgjwang AT mail.csu.edu.cn; csgjwang AT gmail.com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/

No comments: