on Trusted Computing and Communications (TrustCom-10)
-------------------------------------------------------------------------
Organizer: Trusted Computing Institute, Central South University, China
Venue & Dates: Hong Kong SAR, China, December 11-13, 2010
http://trust.csu.edu.cn/conference/trustcom2010
To be held in conjunction with The Eighth IEEE/IFIP International Conference
on Embedded and Ubiquitous Computing (EUC-10) http://www.euc2010.org/
--
Highlight:
(1) Prof. Wanlei Zhou from Deakin University in Australia will offer a keynote
speech entitled "Finding the real source of Internet crimes".
(2) The paper submission deadline has been extended to July 31, 2010 (Firm Deadline).
(3) TrustCom-10 was ranked "A" conference by Australian Research Council
(http://www.arc.gov.au/xls/ERA2010_conference_list.xls).
(4) Distinguished papers, after further revisions, will be published in two
special issues: (A) Elsevier's Computer and Communications (COMCOM);
(B) IEICE¡¯s Transactions on Information and Systems, both to be indexed
by SCI and EI.
--
Introduction
With the rapid development and the increasing complexity of computer and
communications systems and networks, traditional security technologies
and measures can not meet the demand for integrated and dynamic security
solutions. As a challenging and innovative research field, trusted computing
and communications target computer and communications systems and networks
that are available, secure, reliable, controllable, dependable, and so on.
In a word, they must be trustworthy. If we view the traditional security as
identity trust, the broader field of trusted computing and communications
also includes behavior trust of systems and networks. In fact, trusted
computing and communications have become essential components of various
distributed services, applications, and systems, including ad-hoc networks,
peer-to-peer networks, social networks, semantic webs, e-commence, e-government,
pervasive, ubiquitous, and cyber-physical systems.
The Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications
(TrustCom-10) will be held in conjunction with "The Eighth IEEE/IFIP International
Conference on Embedded and Ubiquitous Computing (EUC-10)". It follows the success
of TrustCom-09 in Vancouver, Canada, TrustCom-08 in Zhangjiajie, China, SNDS-07
in Niagara Falls, Canada, SNDS-06 in Vienna, Austria, and SNDS-05 in Fukuoka, Japan.
It aims at bringing together researchers and practitioners in the world working on
trusted computing and communications, with regard to security, safety, privacy,
reliability, dependability, survivability, availability, and fault tolerance aspects
of computer systems and networks, and providing a forum to present and discuss
emerging ideas and trends in this highly challenging research field.
Scope and Interests
TrustCom-10 is an international forum for presenting and discussing emerging ideas
and trends in trusted computing and communications in computer systems and networks
from both the research community as well as the industry. Topics of interest include,
but are not limited to:
(1) Trust semantics, metrics, and models
(2) Trust inference, computation, and combination
(3) Trusted computing platform
(4) Trusted network computing
(5) Trusted operating systems
(6) Trusted software
(7) Trusted database
(8) Trusted services and applications
(9) Trusted communications
(10) Trust in e-commerce and e-government
(11) Trust in mobile and wireless networks
(12) Reliable and fault-tolerant computer systems/networks
(13) Survivable computer systems/networks
(14) Cryptography and security protocols
(15) Authentication in computer systems/networks
(16) Access control in computer systems/networks
(17) Key management in computer systems/networks
(18) Anonymity and privacy in computer systems/networks
(19) Trust in emerging applications
(20) Miscellaneous trust issues
Submission and Publication Information
The accepted papers from this symposium will be published by IEEE Computer Society
in IEEE EUC-10 proceedings (indexed by EI Compendex and ISTP). Papers should be
written in English conforming to the IEEE standard conference format(8.5" x 11",
Two-Column). Papers should be submitted through the paper submission system at the
symposium website. Manuscripts should be submitted through the paper submission
system at the symposium website. Each paper is limited to 6 pages (or 8 pages with
the over length charge). Distinguished papers, after further revisions, will be
published in two special issues: (1) Elsevier's Computer and Communications (COMCOM);
(2) IEICE¡¯s Transactions on Information and Systems, both to be indexed by SCI and EI.
The program committee will select one winner for the Best Paper Award for this symposium.
Submitting a paper to the symposium means that, if the paper is accepted, at least
one author should attend the symposium and present the paper. For no-show authors,
their papers will be removed from the digital library after the symposium and their
affiliations will be notified.
---
Past Special Issues:
TrustCom 2009 SI: Elsevier's Journal of Network and Computer Applications (JNCA),
both SCI and EI indexed.
TrustCom 2008 SI: Wiley's Security and Communication Networks (SCN),
both SCI and EI indexed.
---
Important Dates
(1) Paper submission due: July 9, 2010
(2) Notification of decision: September 6, 2010
(3) Camera-ready papers due: October 4, 2010
General Co-Chairs
Jie Wu, Temple University, USA
Srinivas Sampalli, Dalhousie University, Canada
Program Co-Chairs
Helen Y. Tang, Defence Research & Development Canada¨COttawa, Canada
Xinwen Fu, University of Massachusetts Lowell, USA
Program Committee (in alphabetical order)
Please check "Program Committee" of the conference website
http://trust.csu.edu.cn/conference/trustcom2010/
Steering Committee
Guojun Wang, Central South University, China (Chair)
Laurence T. Yang, St. Francis Xavier University, Canada (Chair)
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Jie Wu, Temple University, USA
Kouichi Sakurai, Kyushu University, Japan
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
Minyi Guo, Shanghai Jiao Tong University, China
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Weijia Jia, City University of Hong Kong, Hong Kong
Publicity Co-Chairs
Alberto Sanchez, Universidad Rey Juan Carlos, Madrid, Spain
Guang Gong, University of Waterloo, Canada
Hamid Mehrvar, Nortel, Canada
Hejun Wu, Sun Yat-Sen University, China
Matthew Wright, University of Texas at Arlington, USA
Shuhui Yang, Purdue University Calumet, USA
Secretariat
Feng Yan, Central South University, China
Webmaster
Qiushuang Du, Central South University, China
Contact
Please email inquiries concerning TrustCom 2010 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
-------------------------------------------------------------------------
Final Call for Papers for the Sixth IEEE/IFIP International Symposium
on Trusted Computing and Communications (TrustCom-10)
-------------------------------------------------------------------------
Organizer: Trusted Computing Institute, Central South University, China
Venue & Dates: Hong Kong SAR, China, December 11-13, 2010
http://trust.csu.edu.cn/conference/trustcom2010
To be held in conjunction with The Eighth IEEE/IFIP International Conference
on Embedded and Ubiquitous Computing (EUC-10) http://www.euc2010.org/
--
Highlight:
(1) Prof. Wanlei Zhou from Deakin University in Australia will offer a
keynote
speech entitled "Finding the real source of Internet crimes".
(2) The paper submission deadline has been extended to July 31, 2010
(Firm Deadline).
(3) TrustCom-10 was ranked "A" conference by Australian Research Council
(http://www.arc.gov.au/xls/ERA2010_conference_list.xls).
(4) Distinguished papers, after further revisions, will be published in two
special issues: (A) Elsevier's Computer and Communications (COMCOM);
(B) IEICE's Transactions on Information and Systems, both to be indexed
by SCI and EI.
--
Introduction
With the rapid development and the increasing complexity of computer and
communications systems and networks, traditional security technologies
and measures can not meet the demand for integrated and dynamic security
solutions. As a challenging and innovative research field, trusted computing
and communications target computer and communications systems and networks
that are available, secure, reliable, controllable, dependable, and so on.
In a word, they must be trustworthy. If we view the traditional security as
identity trust, the broader field of trusted computing and communications
also includes behavior trust of systems and networks. In fact, trusted
computing and communications have become essential components of various
distributed services, applications, and systems, including ad-hoc networks,
peer-to-peer networks, social networks, semantic webs, e-commence,
e-government,
pervasive, ubiquitous, and cyber-physical systems.
The Sixth IEEE/IFIP International Symposium on Trusted Computing and
Communications
(TrustCom-10) will be held in conjunction with "The Eighth IEEE/IFIP
International
Conference on Embedded and Ubiquitous Computing (EUC-10)". It follows
the success
of TrustCom-09 in Vancouver, Canada, TrustCom-08 in Zhangjiajie, China,
SNDS-07
in Niagara Falls, Canada, SNDS-06 in Vienna, Austria, and SNDS-05 in
Fukuoka, Japan.
It aims at bringing together researchers and practitioners in the world
working on
trusted computing and communications, with regard to security, safety,
privacy,
reliability, dependability, survivability, availability, and fault
tolerance aspects
of computer systems and networks, and providing a forum to present and
discuss
emerging ideas and trends in this highly challenging research field.
Scope and Interests
TrustCom-10 is an international forum for presenting and discussing
emerging ideas
and trends in trusted computing and communications in computer systems
and networks
from both the research community as well as the industry. Topics of
interest include,
but are not limited to:
(1) Trust semantics, metrics, and models
(2) Trust inference, computation, and combination
(3) Trusted computing platform
(4) Trusted network computing
(5) Trusted operating systems
(6) Trusted software
(7) Trusted database
(8) Trusted services and applications
(9) Trusted communications
(10) Trust in e-commerce and e-government
(11) Trust in mobile and wireless networks
(12) Reliable and fault-tolerant computer systems/networks
(13) Survivable computer systems/networks
(14) Cryptography and security protocols
(15) Authentication in computer systems/networks
(16) Access control in computer systems/networks
(17) Key management in computer systems/networks
(18) Anonymity and privacy in computer systems/networks
(19) Trust in emerging applications
(20) Miscellaneous trust issues
Submission and Publication Information
The accepted papers from this symposium will be published by IEEE
Computer Society
in IEEE EUC-10 proceedings (indexed by EI Compendex and ISTP). Papers
should be
written in English conforming to the IEEE standard conference
format(8.5" x 11",
Two-Column). Papers should be submitted through the paper submission
system at the
symposium website. Manuscripts should be submitted through the paper
submission
system at the symposium website. Each paper is limited to 6 pages (or 8
pages with
the over length charge). Distinguished papers, after further revisions,
will be
published in two special issues: (1) Elsevier's Computer and
Communications (COMCOM);
(2) IEICE's Transactions on Information and Systems, both to be indexed
by SCI and EI.
The program committee will select one winner for the Best Paper Award
for this symposium.
Submitting a paper to the symposium means that, if the paper is
accepted, at least
one author should attend the symposium and present the paper. For
no-show authors,
their papers will be removed from the digital library after the
symposium and their
affiliations will be notified.
---
Past Special Issues:
TrustCom 2009 SI: Elsevier's Journal of Network and Computer
Applications (JNCA),
both SCI and EI indexed.
TrustCom 2008 SI: Wiley's Security and Communication Networks (SCN),
both SCI and EI indexed.
---
Important Dates
(1) Paper submission due: July 9, 2010
(2) Notification of decision: September 6, 2010
(3) Camera-ready papers due: October 4, 2010
General Co-Chairs
Jie Wu, Temple University, USA
Srinivas Sampalli, Dalhousie University, Canada
Program Co-Chairs
Helen Y. Tang, Defence Research & Development Canada–Ottawa, Canada
Xinwen Fu, University of Massachusetts Lowell, USA
Program Committee (in alphabetical order)
Please check "Program Committee" of the conference website
http://trust.csu.edu.cn/conference/trustcom2010/
Steering Committee
Guojun Wang, Central South University, China (Chair)
Laurence T. Yang, St. Francis Xavier University, Canada (Chair)
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Jie Wu, Temple University, USA
Kouichi Sakurai, Kyushu University, Japan
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
Minyi Guo, Shanghai Jiao Tong University, China
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Weijia Jia, City University of Hong Kong, Hong Kong
Publicity Co-Chairs
Alberto Sanchez, Universidad Rey Juan Carlos, Madrid, Spain
Guang Gong, University of Waterloo, Canada
Hamid Mehrvar, Nortel, Canada
Hejun Wu, Sun Yat-Sen University, China
Matthew Wright, University of Texas at Arlington, USA
Shuhui Yang, Purdue University Calumet, USA
Secretariat
Feng Yan, Central South University, China
Webmaster
Qiushuang Du, Central South University, China
Contact
Please email inquiries concerning TrustCom 2010 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
-------------------------------------------------------------------------
--
---------------------------------------------
Weigang Wu, PhD
Associate Professor
Department of Computer Science
Sun Yat-sen University
No. 132, Waihuan East Rd.,
Guangzhou Higher Education Mega Center,
Guangzhou 510006, China
E-mail: wuweig@mail.sysu.edu.cn
Website: http://sist.sysu.edu.cn/~wuweig/
--------------------------------------------
No comments:
Post a Comment