2008-06-05

[Mycolleagues] Trusted Computing (TrustCom 2008): Submit by June, 15th


                            Call for Papers for
The 2008 International Symposium on Trusted Computing (TrustCom 2008)

Organizer: Trusted Computing Institute, Central South University, China
                Zhang Jia Jie, China, November 18-20, 2008
             http://trust.csu.edu.cn/conference/trustcom2008
                     To be held in conjunction with
The 9th International Conference for Young Computer Scientists (ICYCS 2008)
                     http://www.csu.edu.cn/ICYCS2008
             In cooperation with the IEEE Computer Society
                         http://www.computer.org

Introduction:
The 2008 International Symposium on Trusted Computing (TrustCom 2008), to be
held in conjunction with the 9th International Conference for Young Computer
Scientists (ICYCS 2008), aims at bringing together researchers and practitioners
in the world working on trusted computing with regard to security, safety,
privacy, reliability, dependability, survivability, availability, and fault
tolerance aspects of computer systems and networks, and providing a forum for
them to present and discuss emerging ideas and trends in this highly challenging
research field.

Scope and Interests:
TrustCom 2008 is an international forum for presenting and discussing emerging
ideas and trends in trusted computing in computer systems and networks from both
the research community as well as the industry. Topics of interest include, but
are not limited to:
(1) Semantics, metrics and models of trust
(2) Trust establishment, propagation, and management
(3) Trusted computing platform
(4) Trusted network computing
(5) Trusted operating system
(6) Trusted software
(7) Trusted database
(8) Trusted services and applications
(9) Trust in e-commerce and e-government
(10) Trust in mobile and wireless networks
(11) Cryptography and security protocols
(12) Reliable and fault-tolerant computer systems/networks
(13) Survivable computer systems/networks
(14) Authentication in computer systems/networks
(15) Access control in computer systems/networks
(16) Key management in computer systems/networks


Submission and Publication Information:
The symposium proceedings will be published by the IEEE Computer Society (will
be indexed by EI Compendex & ISTP). Manuscripts should be written in English
conforming to the IEEE standard conference format (8.5" x 11", Two-Column)
[http://www.computer.org/portal/pages/cscps/cps/cps_forms.html]. Manuscripts
should be submitted through the paper submission system at the symposium website
[http://trust.csu.edu.cn/conference/trustcom2008/submission]. Each accepted
paper is limited to 6 pages (or 8 pages with over length charge). Distinguished
papers, after further revisions, will be published in a special issue of
Wiley journal: Security and Communication Networks
(http://www.interscience.wiley.com/security). The program committee will select
one winner for the Best Paper Award for the symposium. Submission of a paper
should be regarded as a commitment such that, if accepted, at least one author
of the paper will register and attend the symposium; otherwise, it will be
removed from the IEEE Digital Library after the symposium.

Important Dates:
(1) Paper submission due:                 June 15, 2008
(2) Notification of decision:         July 15, 2008
(3) Camera-ready papers due:                August 1, 2008

General Co-Chairs:
Weijia Jia, City University of Hong Kong, Hong Kong
Kouichi Sakurai, Kyushu University, Japan
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan

Program Co-Chairs:
Guojun Wang, Central South University, China
Chang-Ai Sun, Beijing Jiao Tong University, China
Bin Xiao, Hong Kong Polytechnic University, Hong Kong

Steering Co-Chairs:
Laurence T. Yang, St. Francis Xavier University, Canada
Minyi Guo, Shanghai Jiao Tong University, China
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong

Publicity Co-Chairs:
Yan Zhang, Simula Research Laboratory, Norway
Baoliu Ye, Nanjing University, China
Peter Mueller, IBM Zurich Research Laboratory, Switzerland

Secretariat:
Yueming Deng, Central South University, China

Program Committee: (in alphabetical order)
Adel Cherif, Qatar University, Qatar
Carlos Baladron, University of Valladolid, Spain
Dafang Zhang, Hunan University, China
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Deqing Zou, Huazhong University of Science & Technology, China
Dong Xiang, Tsinghua University, China
Dongyang Long, Sun Yat-Sen University, China
Emmanuelle Anceaume, IRISA, France
Fang Qi, Central South University, China
Feng Bao, Institute for Infocomm Research, Singapore
Gang Li, Institute of Computing Technology, Chinese Academy of Sciences, China
Geyong Min, University of Bradford, UK
Gianluca Ramunno, Politecnico di Torino, Italy
Gregorio Martinez, University of Murcia (UMU), Spain
Helen Yiqun Tang, Defence Research & Development Canada ¨C Ottawa, Canada
Jean-Marc Seigneur, University of Geneva, Switzerland
Ji Wu, Beihang University, China
Jian Yu, Politecnico di Torino, Italy
Jianhua Ma, Hosei University, Japan
Jie Li, University of Tsukuba, Japan
Jie Wu, National Science Foundation, USA
Jinhua Xiong, Institute of Computing Technology, Chinese Academy of Sciences, China
Jinzhao Wu, Beijing Jiaotong University, China
Jun Shen, University of Wollongong, Australia
Kai-Yuan Cai, Beihang University, China
Kenji Saito, Keio University, Japan
Keqiu Li, Dalian University of Technology, China
Liudong Xing, University of Massachusetts Dartmouth, USA
Marco Aiello, University of Groningen, the Netherlands
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Madrid, Spain
Marten J. Van Sinderen, Universty of Twente, the Netherlands
Masumi Toyoshima, Kitakyushu University, Japan
Mieso Denko, University of Guelph, Canada
Paolo Falcarin, Politecnico di Torino, Italy
Sanglu Lu, Nanjing University, China
Sy-Yen Kuo, National Taiwan University, Taiwan
Tai Xin, Microsoft Corporation, USA
Weiping Wang, Central South University, China
Wenbin Jiang, Huazhong Univ. of Science and Technology, China
Wing-Kwong Chan, City University of Hong Kong, Hong Kong
Xiaolin (Andy) Li, Oklahoma State University, USA
Xiaoying Bai, Tsinghua University, China
Yanbo Han, Institute of Computing Technology, Chinese Academy of Sciences, China
Yi Mu, University of Wollongong, Australia
Young-Sik Jeong, WonKwang University, Korea
Yuzhong Sun, Institute of Computing Technology, Chinese Academy of Sciences, China
Zhiguang Qin, University of Electronic Science and Technology of China, China
Zhi Quan Zhou, University of Wollongong, Australia
Zili Shao, Hong Kong Polytechnic University, Hong Kong

Contact:
Please email inquiries concerning TrustCom 2008 to: Prof. Guojun Wang
Email: csgjwang AT mail.csu.edu.cn; csgjwang AT gmail.com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/

No comments: