Wednesday, April 8, 2015

[DMANET] IEEE TrustCom2015 CFP – Deadline extended to April 20, 2015 (firm)

The 14th IEEE International Conference on Trust, Security and Privacy in
Computing and Communications (IEEE TrustCom-15)
http://comnet.aalto.fi/Trustcom2015/

20-22 August 2015, Helsinki, Finland

Latest news:
6 Keynotes, 4 special issues, 7 workshops and 1 tutorial announced

Special Issues
- Future Generation Computer Systems, Elsevier (SCI & EI indexed, IF:
2.639), "Special Issue on Security, Privacy and Trust of the User-centric
Solutions".

- Information Sciences, Elsevier (SCI & EI indexed, IF: 3.893).

- IEICE Transactions on Information and Systems, (SCI & EI indexed, IF:
0.191).

- Extended versions of selected papers will be considered for publication
in IEEE Internet of Things Journal

Important Dates
Submission Deadline: March 31, 2015 -> extended to April 20, 2015 (Firm)
Authors Notification: May 31, 2015
Final Manuscript Due: July 1, 2015

With the rapid development and increasing complexity of computer systems
and communication networks, user requirements for trust, security and
privacy are becoming more and more demanding. Therefore, there is a grand
challenge that traditional security technologies and measures may not meet
user requirements in open, dynamic, heterogeneous, mobile, wireless, and
distributed computing environments. As a result, we need to build systems
and networks in which various applications allow users to enjoy more
comprehensive services while preserving trust, security and privacy at the
same time. As useful and innovative technologies, trusted computing and
communications are attracting researchers with more and more attention.

The 14th IEEE International Conference on Trust, Security and Privacy in
Computing and Communications (IEEE TrustCom-15) will be held in Helsinki,
Finland on 20-22 August 2015. The conference aims at bringing together
researchers and practitioners in the world working on trusted computing and
communications, with regard to trust, security, privacy, reliability,
dependability, survivability, availability, and fault tolerance aspects of
computer systems and networks, and providing a forum to present and discuss
emerging ideas and trends in this highly challenging research field.

Topics of interest include, but not limited to

Trust Track
- Trust semantics, metrics and models
- Trusted computing platform
- Trusted network computing
- Trusted operating systems
- Trusted software and applications
- Trust in social networks
- Trust in e-commerce and e-government
- Trust in mobile and wireless communications
- Risk and reputation management
- Survivable computer systems/networks
- Trust of 5G
- Miscellaneous trust issues

Security Track
- Network security
- Computer security
- Database security
- Web applications security
- Security policy, model and architecture
- Security in social networks
- Security in parallel and distributed systems
- Security in mobile and wireless communications
- Security in grid/cloud/pervasive computing
- Authentication, authorization and accounting
- Security of 5G
- Miscellaneous security issues

Privacy Track
- Privacy in Web-based applications and services
- Privacy in database systems
- Privacy in parallel and distributed systems
- Privacy in grid/cloud/pervasive computing
- Privacy in mobile and wireless communications
- Privacy in e-commerce and e-government
- Privacy in network deployment and management
- Privacy and trust
- Privacy and security
- Privacy and anonymity
- Privacy preservation in 5G
- Miscellaneous privacy issues


Submission Guidelines

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. Papers must be clearly presented in English, must not
exceed 8 pages, including tables, figures, references and appendixes, in
IEEE Computer Society proceedings format with Portable Document Format
(.pdf). Please submit your paper at
https://research.comnet.aalto.fi/Trustcom2015/paper_submission.html

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission of a paper
should be regarded as a commitment that, should the paper be accepted, at
least one of the authors will register and attend the conference to present
the work. Accepted and presented papers will be included in the IEEE CPS
Proceedings. Distinguished papers presented at the conference, after
further revision, will be recommended to high quality international
journals.


Keynotes (in alphabetical order)
Prof. Robert H. Deng, Singapore Management University, Singapore
Mr. Mikko Hyppönen, Chief Research Officer, F-Secure, Finland
Mr. Lauri Oksanen, VP Research and Technology, Nokia Networks
Prof. Yi Pan, Georgia State University, USA
Prof. Witold Pedrycz, IEEE fellow, EiC of Information Sciences Canada
Research Chair
Prof. Vincenzo Piuri, IEEE fellow, IEEE Vice President on Technical
Activities, EiC of IEEE Systems Journal

Workshops and Symposia
- TrustSoft 2015 (
https://research.comnet.aalto.fi/Trustcom2015/trustsoft2015/)
The 1st IEEE International Workshop on Trustworthy Software Systems

- TSCloud 2015 (https://research.comnet.aalto.fi/Trustcom2015/tscloud2015/)
The 5th IEEE International Symposium on Trust and Security in Cloud
Computing

- SpaIoT 2015 (https://research.comnet.aalto.fi/Trustcom2015/spaiot2015/)
The 8th IEEE International Symposium on Security, Privacy and Anonymity
in Internet of Things

- UbiSafe 2015 (https://research.comnet.aalto.fi/Trustcom2015/ubisafe2015/)
The 7th IEEE International Symposium on UbiSafe Computing

- TrustWSN 2015 (https://research.comnet.aalto.fi/Trustcom2015/trustwsn2015/
)
The 1st IEEE International Workshop on Trust and Security in Wireless
Sensor Networks

- EFINS 2015 (https://research.comnet.aalto.fi/Trustcom2015/efins2015/)
The 2nd IEEE International Workshop on the Emerging Future Internet and
Network Security

- IW5GS 2015 (https://research.comnet.aalto.fi/Trustcom2015/iw5gs2015/)
The 1st IEEE International Workshop on 5G Security

Tutorial: Privacy Engineering Tutorial (
https://research.comnet.aalto.fi/Trustcom2015/tutorials/pets.html)


Organisation Committee

General Chairs
Valtteri Niemi, University of Turku, Finland
Raimo Kantola, Aalto University, Finland

Program Chair
Zheng Yan, Xidian University, China
Peter Mueller, IBM Zurich, Switzerland

Program Vice-Chairs
Trust Track Chair
Xinyi Huang, Fujian Normal University, China

Security Track Chair
Xiangjian (Sean) He, University of Technology, Sydney, Australia

Privacy Track Chair
Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy

Steering Committee
Steering Co-Chairs
Guojun Wang, Central South University, China (Chair)
Laurence T. Yang, St. Francis Xavier University, Canada (Chair)

Publicity Chairs
Ioanna Dionysiou, University of Nicosia, Cyprus
Jin Li, Guangzhou University, China
Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy
Tanveer A Zia, Charles Sturt University, Australia

Workshop Chairs
Matti Hämäläinen, Digile, Finland
Xinyi Huang, Fujian Normal University, China
Igor Kotenko, SPIIRAS, Russia

Finance Chair
Raimo Kantola, Aalto University, Finland

Web Chair
Jesús Llorente Santos, Aalto University, Finland

Steering Committee
Please see http://comnet.aalto.fi/Trustcom2015/

Technical Program Committee
https://research.comnet.aalto.fi/Trustcom2015/program_committee.html

**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************