telco-cg
Threads by month
- ----- 2024 -----
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
June 2011
- 1 participants
- 6 discussions
Please accept our apologies if you received multiple copies.
---------------------------------------------------------------------------------
2011.06.15: The program committee (PC members) have been built.
http://trust.csu.edu.cn/conference/trustcom2011/ProgramCommittee/
2011.06.14: The conference registration has been opened.
http://trust.csu.edu.cn/conference/trustcom2011/registration/
2011.06.10: The keynote information is available.
http://trust.csu.edu.cn/conference/trustcom2011/keynote/
2011.06.01: The travel guide is available.
http://trust.csu.edu.cn/conference/trustcom2011/travel/
2011.05.20: The paper submission system has been opened.
http://trust.csu.edu.cn/conference/trustcom2011/submission/
2010.11.11: The IEEE TrustCom-11 website has been opened.
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Call for Papers
The main conference:
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2011)
http://trust.csu.edu.cn/conference/TrustCom2011/
7 symposiums/workshops in conjunction with TrustCom 2011:
UbiSafe 2011, ISSR 2011, SPIoT 2011, ACS 2011, TrustID 2011,
SQC 2011, and TSCloud 2011. See "Symposiums/Workshops" at:
http://trust.csu.edu.cn/conference/trustcom2011/
Organizers:
School of Information Science and Engineering
& School of Software, Central South University, China
Venue & Dates: Changsha, China, November 16-18, 2011
Introduction
With rapid development and increasing complexity of computer and
communications systems and networks, user requirements for trust,
security and privacy are becoming more and more demanding. However,
there is a grand challenge that traditional security technologies and
measures may not meet user requirements in open, dynamic,
heterogeneous, mobile, wireless, and distributed computing
environments. Therefore, we need to build systems and networks in
which various applications allow users to enjoy more comprehensive
services while preserving trust, security and privacy at the same
time. As useful and innovative technologies, trusted computing and
communications are attracting researchers with more and more
attention.
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom-11) will be held in
Changsha, China in November 16-18, 2011. It results from merging two
conference series: TrustCom (International Symposium on Trusted
Computing and Communications) and TSP (International Symposium on
Trust, Security and Privacy for Emerging Applications). It follows
the success of TrustCom-10 in Hong Kong SAR, China, and TSP-10 in
Bradford, UK. The conference aims at bringing together researchers
and practitioners in the world working on trusted computing and
communications, with regard to trust, security, privacy, reliability,
dependability, survivability, availability, and fault tolerance
aspects of computer systems and networks, and providing a forum to
present and discuss emerging ideas and trends in this highly
challenging research field.
Scope and Interests
IEEE TrustCom-11 is an international conference for presenting and
discussing emerging ideas and trends in trusted computing and
communications in computer systems and networks from both the
research community as well as the industry. Topics of interest
include, but are not limited to:
Trust Track
Chairs: Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
(1) Trust semantics, metrics and models
(2) Trusted computing platform
(3) Trusted network computing
(4) Trusted operating systems
(5) Trusted software and applications
(6) Trust in social networks
(7) Trust in e-commerce and e-government
(8) Trust in mobile and wireless communications
(9) Risk and reputation management
(10) Survivable computer systems/networks
(11) Miscellaneous trust issues
Security Track
Chairs: Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
(1) Network security
(2) Computer security
(3) Database security
(4) Web applications security
(5) Security policy, model and architecture
(6) Security in social networks
(7) Security in parallel and distributed systems
(8) Security in mobile and wireless communications
(9) Security in grid/cloud/pervasive computing
(10) Authentication, authorization and accounting
(11) Miscellaneous security issues
Privacy Track
Chairs: Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
(1) Privacy in Web-based applications and services
(2) Privacy in database systems
(3) Privacy in parallel and distributed systems
(4) Privacy in grid/cloud/pervasive computing
(5) Privacy in mobile and wireless communications
(6) Privacy in e-commerce and e-government
(7) Privacy in network deployment and management
(8) Privacy and trust
(9) Privacy and security
(10) Privacy and anonymity
(11) Miscellaneous privacy issues
Submission and Publication Information
The accepted papers from this conference will be published by IEEE
Computer Society in IEEE proceedings (indexed by EI Compendex and
ISTP). Papers should be written in English conforming to the IEEE
standard conference format (8.5" x 11", Two-Column). Papers should be
submitted through the paper submission system at the conference
website. Each paper is limited to 8 pages (or 12 pages with the over
length charge). Distinguished papers, after further revisions,
will be published in two special issues to be indexed by SCI and EI.
The program committee will select two winners for the Best Paper
Awards for this conference. Submitting a paper to the conference
means that, if the paper is accepted, at least one author should
attend the conference and present the paper. For no-show authors,
their papers will be removed from the digital library after the
conference and their affiliations will be notified.
Important Dates
(1) Paper submission due: June 30, 2011
(2) Notification of decision: August 30, 2011
(3) Camera-ready papers due: September 30, 2011
Honorary Chair
Lijian Tao, Vice President of Central South University, China
Steering Co-Chairs
Guojun Wang, Central South University, China
Laurence T. Yang, St. Francis Xavier University, Canada
General Co-Chairs
Yi Mu, University of Wollongong, Australia
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Bradford, UK
Program Co-Chairs
Huaimin Wang, National University of Defense Technology, China
Stephen R. Tate, University of North Carolina at Greensboro, USA
Yang Xiang, Deakin University, Australia
Program Vice Chairs
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
Program Committee
http://trust.csu.edu.cn/conference/trustcom2011/ProgramCommittee/
Workshop Co-Chairs
Yixin Jiang, Tsinghua University, China
John Fiore, Temple University, USA
Zheng Yan, Nokia Research Center, Finland
Organizing Co-Chairs
Zhigang Chen, Central South University, China
Ming Xu, National University of Defense Technology, China
Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA
Publicity Co-Chairs
Scott Fowler, Linkoping University, Sweden
Felix Gomez Marmol, NEC Laboratories Europe, Germany
Jianliang Gao, University of Ulster, UK
Jose Maria Alcaraz Calero, Hewlett-Packard Laboratories, UK
Jemal H. Abawajy, Deakin University, Australia
Chin-Feng Lee, Chaoyang University of technology, Taiwan
Publication Co-Chairs
Fang Qi, Central South University, China
Congxu Zhu, Central South University, China
Finance Co-Chairs
Jin Zheng, Central South University, China
Guihua Duan, Central South University, China
Steering Committee (in alphabetical order)
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Minyi Guo, Shanghai Jiao Tong University, China
Weijia Jia, City University of Hong Kong, Hong Kong
Jie Li, University of Tsukuba, Japan
Jianhua Ma, Hosei University, Japan
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
Indrakshi Ray, Colorado State University, USA
Kouichi Sakurai, Kyushu University, Japan
Srinivas Sampalli, Dalhousie University, Canada
Ivan Stojmenovic, University of Ottawa, Canada
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Wanlei Zhou, Deakin University, Australia
Program Committee (in alphabetical order)
(Please check the conferencee website for the whole list.)
Organizing Committee
Zhaohui Dai, Central South University, China
Ming Fu, Changsha University of Science and Technology, China
Zhigang Hu, Central South University, China
Changyun Li, Hunan University of Technology, China
Hui Li, Central South University, China
Kenli Li, Hunan University, China
Hong Liu, Hunan Normal University, China
Jianxun Liu, Hunan University of Science and Technology, China
Renren Liu, Xiangtan University, China
Xinjun Mao, National University of Defense Technology, China
Ronghua Shi, Central South University, China
Jianxin Wang, Central South University, China
Beiji Zou, Central South University, China
Secretariats
Pin Liu, Central South University, China
Yongming Xie, Central South University, China
Webmasters
Qian Li, Central South University, China
Xiaofei Xing, Central South University, China
Contact
Please email inquiries concerning IEEE TrustCom 2011 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the conference organizers: TrustCom2011 AT gmail DOT com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Symposiums/Workshops for IEEE TrustCom 2011
(1) The Third IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe 2011)
http://trust.csu.edu.cn/conference/UbiSafe2011/
Main Organizers:
Prof. Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Prof. Hamid Sharif, University of Nebraska-Lincoln, USA
Prof. Xiaolin (Andy) Li, University of Florida, USA
(2) The Third IEEE International Workshop on Security in e-Science and e-Research (IEEE ISSR 2011)
http://trust.csu.edu.cn/conference/ISSR2011/
Main Organziers:
Prof. Richard Sinnott, University of Melbourne, Australia
Prof. Jie Wei, University of West London, UK
Prof. Kouichi Sakurai, Kyushu University, Japan
(3) The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)
http://trust.csu.edu.cn/conference/SPIoT2011/
Main Organizers:
Prof. Indrakshi Ray, Colorado State University, USA
Prof. John Fiore, Temple University, USA
Prof. Weirong Liu, Central South University, China
(4) The 2011 IEEE International Workshop on Anonymity and Communication Networks (IEEE ACN 2011)
http://trust.csu.edu.cn/conference/ACS2011/
Main Organizers:
Prof. Jianhua Ma, Hosei University, Japan
Prof. Guihua Duan, Central South University, China
(5) The 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (IEEE TrustID 2011)
http://trust.csu.edu.cn/conference/TrustID2011/
Main Organizers:
Prof. Zheng Yan, Aalto University, Finland/XiDian University, China
Prof. Raimo Kantola, Aalto University, Finland
Prof. Peng Zhang, Xi'an University of Post and Telecommunications, China
(6) The 2011 IEEE International Workshop on Security and Quantum Communications (IEEE SQC 2011)
http://trust.csu.edu.cn/conference/SQC2011/
Main Organizers:
Prof. Ronghua Shi, Central South University, China
Prof. Guihua Zeng, Shanghai Jiao Tong University, China
Prof. Ying Guo, Central South University, China
(7) The 2011 IEEE International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011)
http://tscloud.org/
Main Organizers:
Prof. Ryan K. L. Ko, Hewlett Packard Laboratories, Singapore
Prof. Markus Kirchberg, Hewlett Packard Laboratories, Singapore
---------------------------------------------------------------------------------
1
4
Please accept our apologies if you received multiple copies.
---------------------------------------------------------------------------------
2011.06.15: The program committee (PC members) have been built.
http://trust.csu.edu.cn/conference/trustcom2011/ProgramCommittee/
2011.06.14: The conference registration has been opened.
http://trust.csu.edu.cn/conference/trustcom2011/registration/
2011.06.10: The keynote information is available.
http://trust.csu.edu.cn/conference/trustcom2011/keynote/
2011.06.01: The travel guide is available.
http://trust.csu.edu.cn/conference/trustcom2011/travel/
2011.05.20: The paper submission system has been opened.
http://trust.csu.edu.cn/conference/trustcom2011/submission/
2010.11.11: The IEEE TrustCom-11 website has been opened.
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Call for Papers
The main conference:
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2011)
http://trust.csu.edu.cn/conference/TrustCom2011/
7 symposiums/workshops in conjunction with TrustCom 2011:
UbiSafe 2011, ISSR 2011, SPIoT 2011, ACS 2011, TrustID 2011,
SQC 2011, and TSCloud 2011. See "Symposiums/Workshops" at:
http://trust.csu.edu.cn/conference/trustcom2011/
Organizers:
School of Information Science and Engineering
& School of Software, Central South University, China
Venue & Dates: Changsha, China, November 16-18, 2011
Introduction
With rapid development and increasing complexity of computer and
communications systems and networks, user requirements for trust,
security and privacy are becoming more and more demanding. However,
there is a grand challenge that traditional security technologies and
measures may not meet user requirements in open, dynamic,
heterogeneous, mobile, wireless, and distributed computing
environments. Therefore, we need to build systems and networks in
which various applications allow users to enjoy more comprehensive
services while preserving trust, security and privacy at the same
time. As useful and innovative technologies, trusted computing and
communications are attracting researchers with more and more
attention.
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom-11) will be held in
Changsha, China in November 16-18, 2011. It results from merging two
conference series: TrustCom (International Symposium on Trusted
Computing and Communications) and TSP (International Symposium on
Trust, Security and Privacy for Emerging Applications). It follows
the success of TrustCom-10 in Hong Kong SAR, China, and TSP-10 in
Bradford, UK. The conference aims at bringing together researchers
and practitioners in the world working on trusted computing and
communications, with regard to trust, security, privacy, reliability,
dependability, survivability, availability, and fault tolerance
aspects of computer systems and networks, and providing a forum to
present and discuss emerging ideas and trends in this highly
challenging research field.
Scope and Interests
IEEE TrustCom-11 is an international conference for presenting and
discussing emerging ideas and trends in trusted computing and
communications in computer systems and networks from both the
research community as well as the industry. Topics of interest
include, but are not limited to:
Trust Track
Chairs: Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
(1) Trust semantics, metrics and models
(2) Trusted computing platform
(3) Trusted network computing
(4) Trusted operating systems
(5) Trusted software and applications
(6) Trust in social networks
(7) Trust in e-commerce and e-government
(8) Trust in mobile and wireless communications
(9) Risk and reputation management
(10) Survivable computer systems/networks
(11) Miscellaneous trust issues
Security Track
Chairs: Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
(1) Network security
(2) Computer security
(3) Database security
(4) Web applications security
(5) Security policy, model and architecture
(6) Security in social networks
(7) Security in parallel and distributed systems
(8) Security in mobile and wireless communications
(9) Security in grid/cloud/pervasive computing
(10) Authentication, authorization and accounting
(11) Miscellaneous security issues
Privacy Track
Chairs: Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
(1) Privacy in Web-based applications and services
(2) Privacy in database systems
(3) Privacy in parallel and distributed systems
(4) Privacy in grid/cloud/pervasive computing
(5) Privacy in mobile and wireless communications
(6) Privacy in e-commerce and e-government
(7) Privacy in network deployment and management
(8) Privacy and trust
(9) Privacy and security
(10) Privacy and anonymity
(11) Miscellaneous privacy issues
Submission and Publication Information
The accepted papers from this conference will be published by IEEE
Computer Society in IEEE proceedings (indexed by EI Compendex and
ISTP). Papers should be written in English conforming to the IEEE
standard conference format (8.5" x 11", Two-Column). Papers should be
submitted through the paper submission system at the conference
website. Each paper is limited to 8 pages (or 12 pages with the over
length charge). Distinguished papers, after further revisions,
will be published in two special issues to be indexed by SCI and EI.
The program committee will select two winners for the Best Paper
Awards for this conference. Submitting a paper to the conference
means that, if the paper is accepted, at least one author should
attend the conference and present the paper. For no-show authors,
their papers will be removed from the digital library after the
conference and their affiliations will be notified.
Important Dates
(1) Paper submission due: June 30, 2011
(2) Notification of decision: August 30, 2011
(3) Camera-ready papers due: September 30, 2011
Honorary Chair
Lijian Tao, Vice President of Central South University, China
Steering Co-Chairs
Guojun Wang, Central South University, China
Laurence T. Yang, St. Francis Xavier University, Canada
General Co-Chairs
Yi Mu, University of Wollongong, Australia
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Bradford, UK
Program Co-Chairs
Huaimin Wang, National University of Defense Technology, China
Stephen R. Tate, University of North Carolina at Greensboro, USA
Yang Xiang, Deakin University, Australia
Program Vice Chairs
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
Program Committee
http://trust.csu.edu.cn/conference/trustcom2011/ProgramCommittee/
Workshop Co-Chairs
Yixin Jiang, Tsinghua University, China
John Fiore, Temple University, USA
Zheng Yan, Nokia Research Center, Finland
Organizing Co-Chairs
Zhigang Chen, Central South University, China
Ming Xu, National University of Defense Technology, China
Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA
Publicity Co-Chairs
Scott Fowler, Linkoping University, Sweden
Felix Gomez Marmol, NEC Laboratories Europe, Germany
Jianliang Gao, University of Ulster, UK
Jose Maria Alcaraz Calero, Hewlett-Packard Laboratories, UK
Jemal H. Abawajy, Deakin University, Australia
Chin-Feng Lee, Chaoyang University of technology, Taiwan
Publication Co-Chairs
Fang Qi, Central South University, China
Congxu Zhu, Central South University, China
Finance Co-Chairs
Jin Zheng, Central South University, China
Guihua Duan, Central South University, China
Steering Committee (in alphabetical order)
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Minyi Guo, Shanghai Jiao Tong University, China
Weijia Jia, City University of Hong Kong, Hong Kong
Jie Li, University of Tsukuba, Japan
Jianhua Ma, Hosei University, Japan
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
Indrakshi Ray, Colorado State University, USA
Kouichi Sakurai, Kyushu University, Japan
Srinivas Sampalli, Dalhousie University, Canada
Ivan Stojmenovic, University of Ottawa, Canada
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Wanlei Zhou, Deakin University, Australia
Program Committee (in alphabetical order)
(Please check the conferencee website for the whole list.)
Organizing Committee
Zhaohui Dai, Central South University, China
Ming Fu, Changsha University of Science and Technology, China
Zhigang Hu, Central South University, China
Changyun Li, Hunan University of Technology, China
Hui Li, Central South University, China
Kenli Li, Hunan University, China
Hong Liu, Hunan Normal University, China
Jianxun Liu, Hunan University of Science and Technology, China
Renren Liu, Xiangtan University, China
Xinjun Mao, National University of Defense Technology, China
Ronghua Shi, Central South University, China
Jianxin Wang, Central South University, China
Beiji Zou, Central South University, China
Secretariats
Pin Liu, Central South University, China
Yongming Xie, Central South University, China
Webmasters
Qian Li, Central South University, China
Xiaofei Xing, Central South University, China
Contact
Please email inquiries concerning IEEE TrustCom 2011 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the conference organizers: TrustCom2011 AT gmail DOT com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Symposiums/Workshops for IEEE TrustCom 2011
(1) The Third IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe 2011)
http://trust.csu.edu.cn/conference/UbiSafe2011/
Main Organizers:
Prof. Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Prof. Hamid Sharif, University of Nebraska-Lincoln, USA
Prof. Xiaolin (Andy) Li, University of Florida, USA
(2) The Third IEEE International Workshop on Security in e-Science and e-Research (IEEE ISSR 2011)
http://trust.csu.edu.cn/conference/ISSR2011/
Main Organziers:
Prof. Richard Sinnott, University of Melbourne, Australia
Prof. Jie Wei, University of West London, UK
Prof. Kouichi Sakurai, Kyushu University, Japan
(3) The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)
http://trust.csu.edu.cn/conference/SPIoT2011/
Main Organizers:
Prof. Indrakshi Ray, Colorado State University, USA
Prof. John Fiore, Temple University, USA
Prof. Weirong Liu, Central South University, China
(4) The 2011 IEEE International Workshop on Anonymity and Communication Networks (IEEE ACN 2011)
http://trust.csu.edu.cn/conference/ACS2011/
Main Organizers:
Prof. Jianhua Ma, Hosei University, Japan
Prof. Guihua Duan, Central South University, China
(5) The 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (IEEE TrustID 2011)
http://trust.csu.edu.cn/conference/TrustID2011/
Main Organizers:
Prof. Zheng Yan, Aalto University, Finland/XiDian University, China
Prof. Raimo Kantola, Aalto University, Finland
Prof. Peng Zhang, Xi'an University of Post and Telecommunications, China
(6) The 2011 IEEE International Workshop on Security and Quantum Communications (IEEE SQC 2011)
http://trust.csu.edu.cn/conference/SQC2011/
Main Organizers:
Prof. Ronghua Shi, Central South University, China
Prof. Guihua Zeng, Shanghai Jiao Tong University, China
Prof. Ying Guo, Central South University, China
(7) The 2011 IEEE International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011)
http://tscloud.org/
Main Organizers:
Prof. Ryan K. L. Ko, Hewlett Packard Laboratories, Singapore
Prof. Markus Kirchberg, Hewlett Packard Laboratories, Singapore
---------------------------------------------------------------------------------
1
0
Please accept our apologies if you received multiple copies.
---------------------------------------------------------------------------------
***** The paper submission system now opens (2011.05.20).
*****
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Call for Papers
The main conference:
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2011)
http://trust.csu.edu.cn/conference/TrustCom2011/
7 symposiums/workshops in conjunction with TrustCom 2011:
UbiSafe 2011, ISSR 2011, SPIoT 2011, ACS 2011, TrustID 2011,
SQC 2011, and TSCloud 2011. See "Symposiums/Workshops" at:
http://trust.csu.edu.cn/conference/trustcom2011/
Organizers:
School of Information Science and Engineering
& School of Software, Central South University, China
Venue & Dates: Changsha, China, November 16-18, 2011
Introduction
With rapid development and increasing complexity of computer and
communications systems and networks, user requirements for trust,
security and privacy are becoming more and more demanding. However,
there is a grand challenge that traditional security technologies and
measures may not meet user requirements in open, dynamic,
heterogeneous, mobile, wireless, and distributed computing
environments. Therefore, we need to build systems and networks in
which various applications allow users to enjoy more comprehensive
services while preserving trust, security and privacy at the same
time. As useful and innovative technologies, trusted computing and
communications are attracting researchers with more and more
attention.
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom-11) will be held in
Changsha, China in November 16-18, 2011. It results from merging two
conference series: TrustCom (International Symposium on Trusted
Computing and Communications) and TSP (International Symposium on
Trust, Security and Privacy for Emerging Applications). It follows
the success of TrustCom-10 in Hong Kong SAR, China, and TSP-10 in
Bradford, UK. The conference aims at bringing together researchers
and practitioners in the world working on trusted computing and
communications, with regard to trust, security, privacy, reliability,
dependability, survivability, availability, and fault tolerance
aspects of computer systems and networks, and providing a forum to
present and discuss emerging ideas and trends in this highly
challenging research field.
Scope and Interests
IEEE TrustCom-11 is an international conference for presenting and
discussing emerging ideas and trends in trusted computing and
communications in computer systems and networks from both the
research community as well as the industry. Topics of interest
include, but are not limited to:
Trust Track
Chairs: Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
(1) Trust semantics, metrics and models
(2) Trusted computing platform
(3) Trusted network computing
(4) Trusted operating systems
(5) Trusted software and applications
(6) Trust in social networks
(7) Trust in e-commerce and e-government
(8) Trust in mobile and wireless communications
(9) Risk and reputation management
(10) Survivable computer systems/networks
(11) Miscellaneous trust issues
Security Track
Chairs: Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
(1) Network security
(2) Computer security
(3) Database security
(4) Web applications security
(5) Security policy, model and architecture
(6) Security in social networks
(7) Security in parallel and distributed systems
(8) Security in mobile and wireless communications
(9) Security in grid/cloud/pervasive computing
(10) Authentication, authorization and accounting
(11) Miscellaneous security issues
Privacy Track
Chairs: Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
(1) Privacy in Web-based applications and services
(2) Privacy in database systems
(3) Privacy in parallel and distributed systems
(4) Privacy in grid/cloud/pervasive computing
(5) Privacy in mobile and wireless communications
(6) Privacy in e-commerce and e-government
(7) Privacy in network deployment and management
(8) Privacy and trust
(9) Privacy and security
(10) Privacy and anonymity
(11) Miscellaneous privacy issues
Submission and Publication Information
The accepted papers from this conference will be published by IEEE
Computer Society in IEEE proceedings (indexed by EI Compendex and
ISTP). Papers should be written in English conforming to the IEEE
standard conference format (8.5" x 11", Two-Column). Papers should be
submitted through the paper submission system at the conference
website. Each paper is limited to 8 pages (or 12 pages with the over
length charge). Distinguished papers, after further revisions,
will be published in two special issues to be indexed by SCI and EI.
The program committee will select two winners for the Best Paper
Awards for this conference. Submitting a paper to the conference
means that, if the paper is accepted, at least one author should
attend the conference and present the paper. For no-show authors,
their papers will be removed from the digital library after the
conference and their affiliations will be notified.
Important Dates
(1) Paper submission due: June 30, 2011
(2) Notification of decision: August 30, 2011
(3) Camera-ready papers due: September 30, 2011
Honorary Chair
Lijian Tao, Vice President of Central South University, China
Steering Co-Chairs
Guojun Wang, Central South University, China
Laurence T. Yang, St. Francis Xavier University, Canada
General Co-Chairs
Yi Mu, University of Wollongong, Australia
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Bradford, UK
Program Co-Chairs
Huaimin Wang, National University of Defense Technology, China
Stephen R. Tate, University of North Carolina at Greensboro, USA
Yang Xiang, Deakin University, Australia
Program Vice Chairs
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
Workshop Co-Chairs
Yixin Jiang, Tsinghua University, China
John Fiore, Temple University, USA
Zheng Yan, Nokia Research Center, Finland
Organizing Co-Chairs
Zhigang Chen, Central South University, China
Ming Xu, National University of Defense Technology, China
Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA
Publicity Co-Chairs
Scott Fowler, Linkoping University, Sweden
Felix Gomez Marmol, NEC Laboratories Europe, Germany
Jianliang Gao, University of Ulster, UK
Jose Maria Alcaraz Calero, Hewlett-Packard Laboratories, UK
Jemal H. Abawajy, Deakin University, Australia
Chin-Feng Lee, Chaoyang University of technology, Taiwan
Publication Co-Chairs
Fang Qi, Central South University, China
Congxu Zhu, Central South University, China
Finance Co-Chairs
Jin Zheng, Central South University, China
Guihua Duan, Central South University, China
Steering Committee (in alphabetical order)
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Minyi Guo, Shanghai Jiao Tong University, China
Weijia Jia, City University of Hong Kong, Hong Kong
Jie Li, University of Tsukuba, Japan
Jianhua Ma, Hosei University, Japan
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
Indrakshi Ray, Colorado State University, USA
Kouichi Sakurai, Kyushu University, Japan
Srinivas Sampalli, Dalhousie University, Canada
Ivan Stojmenovic, University of Ottawa, Canada
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Wanlei Zhou, Deakin University, Australia
Program Committee (in alphabetical order)
(Please check the conferencee website for the whole list.)
Organizing Committee
Zhaohui Dai, Central South University, China
Ming Fu, Changsha University of Science and Technology, China
Zhigang Hu, Central South University, China
Changyun Li, Hunan University of Technology, China
Hui Li, Central South University, China
Kenli Li, Hunan University, China
Hong Liu, Hunan Normal University, China
Jianxun Liu, Hunan University of Science and Technology, China
Renren Liu, Xiangtan University, China
Xinjun Mao, National University of Defense Technology, China
Ronghua Shi, Central South University, China
Jianxin Wang, Central South University, China
Beiji Zou, Central South University, China
Secretariats
Pin Liu, Central South University, China
Yongming Xie, Central South University, China
Webmasters
Qian Li, Central South University, China
Xiaofei Xing, Central South University, China
Contact
Please email inquiries concerning IEEE TrustCom 2011 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the conference organizers: TrustCom2011 AT gmail DOT com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Symposiums/Workshops for IEEE TrustCom 2011
(1) The Third IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe 2011)
http://trust.csu.edu.cn/conference/UbiSafe2011/
Main Organizers:
Prof. Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Prof. Hamid Sharif, University of Nebraska-Lincoln, USA
Prof. Xiaolin (Andy) Li, University of Florida, USA
(2) The Third IEEE International Workshop on Security in e-Science and e-Research (IEEE ISSR 2011)
http://trust.csu.edu.cn/conference/ISSR2011/
Main Organziers:
Prof. Richard Sinnott, University of Melbourne, Australia
Prof. Jie Wei, University of West London, UK
Prof. Kouichi Sakurai, Kyushu University, Japan
(3) The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)
http://trust.csu.edu.cn/conference/SPIoT2011/
Main Organizers:
Prof. Indrakshi Ray, Colorado State University, USA
Prof. John Fiore, Temple University, USA
Prof. Weirong Liu, Central South University, China
(4) The 2011 IEEE International Workshop on Anonymity and Communication Networks (IEEE ACN 2011)
http://trust.csu.edu.cn/conference/ACS2011/
Main Organizers:
Prof. Jianhua Ma, Hosei University, Japan
Prof. Guihua Duan, Central South University, China
(5) The 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (IEEE TrustID 2011)
http://trust.csu.edu.cn/conference/TrustID2011/
Main Organizers:
Prof. Zheng Yan, Aalto University, Finland/XiDian University, China
Prof. Raimo Kantola, Aalto University, Finland
Prof. Peng Zhang, Xi'an University of Post and Telecommunications, China
(6) The 2011 IEEE International Workshop on Security and Quantum Communications (IEEE SQC 2011)
http://trust.csu.edu.cn/conference/SQC2011/
Main Organizers:
Prof. Ronghua Shi, Central South University, China
Prof. Guihua Zeng, Shanghai Jiao Tong University, China
Prof. Ying Guo, Central South University, China
(7) The 2011 IEEE International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011)
http://tscloud.org/
Main Organizers:
Prof. Ryan K. L. Ko, Hewlett Packard Laboratories, Singapore
Prof. Markus Kirchberg, Hewlett Packard Laboratories, Singapore
---------------------------------------------------------------------------------
1
0
Please accept our apologies if you received multiple copies.
---------------------------------------------------------------------------------
***** The paper submission system now opens (2011.05.20).
*****
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Call for Papers
The main conference:
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2011)
http://trust.csu.edu.cn/conference/TrustCom2011/
7 symposiums/workshops in conjunction with TrustCom 2011:
UbiSafe 2011, ISSR 2011, SPIoT 2011, ACS 2011, TrustID 2011,
SQC 2011, and TSCloud 2011. See "Symposiums/Workshops" at:
http://trust.csu.edu.cn/conference/trustcom2011/
Organizers:
School of Information Science and Engineering
& School of Software, Central South University, China
Venue & Dates: Changsha, China, November 16-18, 2011
Introduction
With rapid development and increasing complexity of computer and
communications systems and networks, user requirements for trust,
security and privacy are becoming more and more demanding. However,
there is a grand challenge that traditional security technologies and
measures may not meet user requirements in open, dynamic,
heterogeneous, mobile, wireless, and distributed computing
environments. Therefore, we need to build systems and networks in
which various applications allow users to enjoy more comprehensive
services while preserving trust, security and privacy at the same
time. As useful and innovative technologies, trusted computing and
communications are attracting researchers with more and more
attention.
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom-11) will be held in
Changsha, China in November 16-18, 2011. It results from merging two
conference series: TrustCom (International Symposium on Trusted
Computing and Communications) and TSP (International Symposium on
Trust, Security and Privacy for Emerging Applications). It follows
the success of TrustCom-10 in Hong Kong SAR, China, and TSP-10 in
Bradford, UK. The conference aims at bringing together researchers
and practitioners in the world working on trusted computing and
communications, with regard to trust, security, privacy, reliability,
dependability, survivability, availability, and fault tolerance
aspects of computer systems and networks, and providing a forum to
present and discuss emerging ideas and trends in this highly
challenging research field.
Scope and Interests
IEEE TrustCom-11 is an international conference for presenting and
discussing emerging ideas and trends in trusted computing and
communications in computer systems and networks from both the
research community as well as the industry. Topics of interest
include, but are not limited to:
Trust Track
Chairs: Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
(1) Trust semantics, metrics and models
(2) Trusted computing platform
(3) Trusted network computing
(4) Trusted operating systems
(5) Trusted software and applications
(6) Trust in social networks
(7) Trust in e-commerce and e-government
(8) Trust in mobile and wireless communications
(9) Risk and reputation management
(10) Survivable computer systems/networks
(11) Miscellaneous trust issues
Security Track
Chairs: Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
(1) Network security
(2) Computer security
(3) Database security
(4) Web applications security
(5) Security policy, model and architecture
(6) Security in social networks
(7) Security in parallel and distributed systems
(8) Security in mobile and wireless communications
(9) Security in grid/cloud/pervasive computing
(10) Authentication, authorization and accounting
(11) Miscellaneous security issues
Privacy Track
Chairs: Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
(1) Privacy in Web-based applications and services
(2) Privacy in database systems
(3) Privacy in parallel and distributed systems
(4) Privacy in grid/cloud/pervasive computing
(5) Privacy in mobile and wireless communications
(6) Privacy in e-commerce and e-government
(7) Privacy in network deployment and management
(8) Privacy and trust
(9) Privacy and security
(10) Privacy and anonymity
(11) Miscellaneous privacy issues
Submission and Publication Information
The accepted papers from this conference will be published by IEEE
Computer Society in IEEE proceedings (indexed by EI Compendex and
ISTP). Papers should be written in English conforming to the IEEE
standard conference format (8.5" x 11", Two-Column). Papers should be
submitted through the paper submission system at the conference
website. Each paper is limited to 8 pages (or 12 pages with the over
length charge). Distinguished papers, after further revisions,
will be published in two special issues to be indexed by SCI and EI.
The program committee will select two winners for the Best Paper
Awards for this conference. Submitting a paper to the conference
means that, if the paper is accepted, at least one author should
attend the conference and present the paper. For no-show authors,
their papers will be removed from the digital library after the
conference and their affiliations will be notified.
Important Dates
(1) Paper submission due: June 30, 2011
(2) Notification of decision: August 30, 2011
(3) Camera-ready papers due: September 30, 2011
Honorary Chair
Lijian Tao, Vice President of Central South University, China
Steering Co-Chairs
Guojun Wang, Central South University, China
Laurence T. Yang, St. Francis Xavier University, Canada
General Co-Chairs
Yi Mu, University of Wollongong, Australia
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Bradford, UK
Program Co-Chairs
Huaimin Wang, National University of Defense Technology, China
Stephen R. Tate, University of North Carolina at Greensboro, USA
Yang Xiang, Deakin University, Australia
Program Vice Chairs
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
Workshop Co-Chairs
Yixin Jiang, Tsinghua University, China
John Fiore, Temple University, USA
Zheng Yan, Nokia Research Center, Finland
Organizing Co-Chairs
Zhigang Chen, Central South University, China
Ming Xu, National University of Defense Technology, China
Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA
Publicity Co-Chairs
Scott Fowler, Linkoping University, Sweden
Felix Gomez Marmol, NEC Laboratories Europe, Germany
Jianliang Gao, University of Ulster, UK
Jose Maria Alcaraz Calero, Hewlett-Packard Laboratories, UK
Jemal H. Abawajy, Deakin University, Australia
Chin-Feng Lee, Chaoyang University of technology, Taiwan
Publication Co-Chairs
Fang Qi, Central South University, China
Congxu Zhu, Central South University, China
Finance Co-Chairs
Jin Zheng, Central South University, China
Guihua Duan, Central South University, China
Steering Committee (in alphabetical order)
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Minyi Guo, Shanghai Jiao Tong University, China
Weijia Jia, City University of Hong Kong, Hong Kong
Jie Li, University of Tsukuba, Japan
Jianhua Ma, Hosei University, Japan
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
Indrakshi Ray, Colorado State University, USA
Kouichi Sakurai, Kyushu University, Japan
Srinivas Sampalli, Dalhousie University, Canada
Ivan Stojmenovic, University of Ottawa, Canada
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Wanlei Zhou, Deakin University, Australia
Program Committee (in alphabetical order)
(Please check the conferencee website for the whole list.)
Organizing Committee
Zhaohui Dai, Central South University, China
Ming Fu, Changsha University of Science and Technology, China
Zhigang Hu, Central South University, China
Changyun Li, Hunan University of Technology, China
Hui Li, Central South University, China
Kenli Li, Hunan University, China
Hong Liu, Hunan Normal University, China
Jianxun Liu, Hunan University of Science and Technology, China
Renren Liu, Xiangtan University, China
Xinjun Mao, National University of Defense Technology, China
Ronghua Shi, Central South University, China
Jianxin Wang, Central South University, China
Beiji Zou, Central South University, China
Secretariats
Pin Liu, Central South University, China
Yongming Xie, Central South University, China
Webmasters
Qian Li, Central South University, China
Xiaofei Xing, Central South University, China
Contact
Please email inquiries concerning IEEE TrustCom 2011 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the conference organizers: TrustCom2011 AT gmail DOT com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Symposiums/Workshops for IEEE TrustCom 2011
(1) The Third IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe 2011)
http://trust.csu.edu.cn/conference/UbiSafe2011/
Main Organizers:
Prof. Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Prof. Hamid Sharif, University of Nebraska-Lincoln, USA
Prof. Xiaolin (Andy) Li, University of Florida, USA
(2) The Third IEEE International Workshop on Security in e-Science and e-Research (IEEE ISSR 2011)
http://trust.csu.edu.cn/conference/ISSR2011/
Main Organziers:
Prof. Richard Sinnott, University of Melbourne, Australia
Prof. Jie Wei, University of West London, UK
Prof. Kouichi Sakurai, Kyushu University, Japan
(3) The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)
http://trust.csu.edu.cn/conference/SPIoT2011/
Main Organizers:
Prof. Indrakshi Ray, Colorado State University, USA
Prof. John Fiore, Temple University, USA
Prof. Weirong Liu, Central South University, China
(4) The 2011 IEEE International Workshop on Anonymity and Communication Networks (IEEE ACN 2011)
http://trust.csu.edu.cn/conference/ACS2011/
Main Organizers:
Prof. Jianhua Ma, Hosei University, Japan
Prof. Guihua Duan, Central South University, China
(5) The 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (IEEE TrustID 2011)
http://trust.csu.edu.cn/conference/TrustID2011/
Main Organizers:
Prof. Zheng Yan, Aalto University, Finland/XiDian University, China
Prof. Raimo Kantola, Aalto University, Finland
Prof. Peng Zhang, Xi'an University of Post and Telecommunications, China
(6) The 2011 IEEE International Workshop on Security and Quantum Communications (IEEE SQC 2011)
http://trust.csu.edu.cn/conference/SQC2011/
Main Organizers:
Prof. Ronghua Shi, Central South University, China
Prof. Guihua Zeng, Shanghai Jiao Tong University, China
Prof. Ying Guo, Central South University, China
(7) The 2011 IEEE International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011)
http://tscloud.org/
Main Organizers:
Prof. Ryan K. L. Ko, Hewlett Packard Laboratories, Singapore
Prof. Markus Kirchberg, Hewlett Packard Laboratories, Singapore
---------------------------------------------------------------------------------
1
0
Australasian Telecommunication Networks And Applications Conference (ATNAC 2011)
(http://atnac2011.cs.latrobe.edu.au/)
9-11th NOVEMBER 2011, Melbourne, Australia
(DUE DATE extended until 15th JUNE 2011 -final due date)
Technically Co-Sponsored by IEEE Communications Society, and IEEE.
****Conference Proceedings will be published in IEEE Xplore(r).
**** SIX (6) Student travel grants each $1000 AUD available for this conference.
**** Springer - Telecommunication Systems (ISI Indexed) Journal will publish Selected presented papers at ATNAC 2011.
*****For initial Submission we allow 6-8 pages Maximum.
With the increasing number of emerging robust networks, the challenge to design new networking protocols and techniques are never ending. With the imminent deployment of 4G and other emerging technologies, the demand for better service and quality has never been greater. ATNAC has been the forum for researchers and engineers to present and discuss topics related to advanced telecommunication network technologies and services. Research areas covered by the conference include but are not limited to the following topics:
? MIMO and Multi-antenna Communications
? Ultra Wide Band
? Wireless Sensor Networks
? CDMA, TDMA and other air Interface
? Next Generation Wireless Technologies
? Satellite and Space Communications
? Multimedia Communications
? Network and Information Security
? Interface Optics, Wireless and Cooperative signal
? Grid Computing and service computing
? Wi-Max and LTE
? QoS and resource management
? Wireless routing and ad-hoc networks
? Relay assisted and cooperative communications
? Smart antennas
? Wireless propagation and channel modelling
? Cognitive radio networks
? Wireless access techniques
? Radio resource management
? Broadcast/Multicast wireless technologies
? Wireless LANs and PANs
? Modelling and simulation techniques
? Cellular and Mobile Communications
? Embedded Systems and Networking
? Peer-to-Peer systems
? Security, privacy and trust
? Grid, Cluster and Green Networking
IMPORTANT DEADLINES (Tentative)
Paper Submission deadline : 5th JUNE 2011
Workshop proposals deadline : 1st May 2011
Notification of Acceptance: 24th July 2011
Submission of camera-ready versions of accepted papers: 14th August 2011
Registration due date : 5th September 2011
Paper submissions can be made via EDAS (http://edas.info/newPaper.php?c=10095)
General Co-Chairs
Naveen Chilamkurti
La Trobe University, Australia
n.chilamkurti(a)latrobe.edu.au
Abbas Jamalipour
University of Sydney, Australia
a.jamalipour(a)ieee.org
Track Chairs
Sherali Zeadally
University of District of Columbia, USA
Sudip Misra
Indian Institute of Technology, India
Jean Armstrong
Monash University, Australia
Jin Kwak
Soonchunhyang University, Korea
Masuduzzaman Bakaul
University of Melbourne , Australia
Steering Committee
Hsiao-Hwa Chen
National Chung Kung University, Taiwan
Thanos Vasilakos
University of Western Macedonia, Greece
James Park
Seoul National University of Science and Technology, Korea Mohammad Obadiat Monmouth University, USA
Honorary Chair
Prof. Phoebe Chen , La Trobe University, Australia
1
0
Please accept our apologies if you received multiple copies.
---------------------------------------------------------------------------------
***** The paper submission system now opens (2011.05.20). *****
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Call for Papers
The main conference:
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom 2011)
http://trust.csu.edu.cn/conference/TrustCom2011/
7 symposiums/workshops in conjunction with TrustCom 2011:
UbiSafe 2011, ISSR 2011, SPIoT 2011, ACS 2011, TrustID 2011,
SQC 2011, and TSCloud 2011. See "Symposiums/Workshops" at:
http://trust.csu.edu.cn/conference/trustcom2011/
Organizers:
School of Information Science and Engineering
& School of Software, Central South University, China
Venue & Dates: Changsha, China, November 16-18, 2011
Introduction
With rapid development and increasing complexity of computer and
communications systems and networks, user requirements for trust,
security and privacy are becoming more and more demanding. However,
there is a grand challenge that traditional security technologies and
measures may not meet user requirements in open, dynamic,
heterogeneous, mobile, wireless, and distributed computing
environments. Therefore, we need to build systems and networks in
which various applications allow users to enjoy more comprehensive
services while preserving trust, security and privacy at the same
time. As useful and innovative technologies, trusted computing and
communications are attracting researchers with more and more
attention.
The 10th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom-11) will be held in
Changsha, China in November 16-18, 2011. It results from merging two
conference series: TrustCom (International Symposium on Trusted
Computing and Communications) and TSP (International Symposium on
Trust, Security and Privacy for Emerging Applications). It follows
the success of TrustCom-10 in Hong Kong SAR, China, and TSP-10 in
Bradford, UK. The conference aims at bringing together researchers
and practitioners in the world working on trusted computing and
communications, with regard to trust, security, privacy, reliability,
dependability, survivability, availability, and fault tolerance
aspects of computer systems and networks, and providing a forum to
present and discuss emerging ideas and trends in this highly
challenging research field.
Scope and Interests
IEEE TrustCom-11 is an international conference for presenting and
discussing emerging ideas and trends in trusted computing and
communications in computer systems and networks from both the
research community as well as the industry. Topics of interest
include, but are not limited to:
Trust Track
Chairs: Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
(1) Trust semantics, metrics and models
(2) Trusted computing platform
(3) Trusted network computing
(4) Trusted operating systems
(5) Trusted software and applications
(6) Trust in social networks
(7) Trust in e-commerce and e-government
(8) Trust in mobile and wireless communications
(9) Risk and reputation management
(10) Survivable computer systems/networks
(11) Miscellaneous trust issues
Security Track
Chairs: Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
(1) Network security
(2) Computer security
(3) Database security
(4) Web applications security
(5) Security policy, model and architecture
(6) Security in social networks
(7) Security in parallel and distributed systems
(8) Security in mobile and wireless communications
(9) Security in grid/cloud/pervasive computing
(10) Authentication, authorization and accounting
(11) Miscellaneous security issues
Privacy Track
Chairs: Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
(1) Privacy in Web-based applications and services
(2) Privacy in database systems
(3) Privacy in parallel and distributed systems
(4) Privacy in grid/cloud/pervasive computing
(5) Privacy in mobile and wireless communications
(6) Privacy in e-commerce and e-government
(7) Privacy in network deployment and management
(8) Privacy and trust
(9) Privacy and security
(10) Privacy and anonymity
(11) Miscellaneous privacy issues
Submission and Publication Information
The accepted papers from this conference will be published by IEEE
Computer Society in IEEE proceedings (indexed by EI Compendex and
ISTP). Papers should be written in English conforming to the IEEE
standard conference format (8.5" x 11", Two-Column). Papers should be
submitted through the paper submission system at the conference
website. Each paper is limited to 8 pages (or 12 pages with the over
length charge). Distinguished papers, after further revisions,
will be published in two special issues to be indexed by SCI and EI.
The program committee will select two winners for the Best Paper
Awards for this conference. Submitting a paper to the conference
means that, if the paper is accepted, at least one author should
attend the conference and present the paper. For no-show authors,
their papers will be removed from the digital library after the
conference and their affiliations will be notified.
Important Dates
(1) Paper submission due: June 30, 2011
(2) Notification of decision: August 30, 2011
(3) Camera-ready papers due: September 30, 2011
Honorary Chair
Lijian Tao, Vice President of Central South University, China
Steering Co-Chairs
Guojun Wang, Central South University, China
Laurence T. Yang, St. Francis Xavier University, Canada
General Co-Chairs
Yi Mu, University of Wollongong, Australia
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Bradford, UK
Program Co-Chairs
Huaimin Wang, National University of Defense Technology, China
Stephen R. Tate, University of North Carolina at Greensboro, USA
Yang Xiang, Deakin University, Australia
Program Vice Chairs
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China
Indrajit Ray, Colorado State University, USA
Liqun Chen, HP Labs in Bristol, UK
Guilin Wang, University of Wollongong, Australia
Hua Wang, The University of Southern Queensland, Australia
Christoph Sorge, University of Paderborn, Germany
Workshop Co-Chairs
Yixin Jiang, Tsinghua University, China
John Fiore, Temple University, USA
Zheng Yan, Nokia Research Center, Finland
Organizing Co-Chairs
Zhigang Chen, Central South University, China
Ming Xu, National University of Defense Technology, China
Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA
Publicity Co-Chairs
Scott Fowler, Linkoping University, Sweden
Felix Gomez Marmol, NEC Laboratories Europe, Germany
Jianliang Gao, University of Ulster, UK
Jose Maria Alcaraz Calero, Hewlett-Packard Laboratories, UK
Jemal H. Abawajy, Deakin University, Australia
Chin-Feng Lee, Chaoyang University of technology, Taiwan
Publication Co-Chairs
Fang Qi, Central South University, China
Congxu Zhu, Central South University, China
Finance Co-Chairs
Jin Zheng, Central South University, China
Guihua Duan, Central South University, China
Steering Committee (in alphabetical order)
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Minyi Guo, Shanghai Jiao Tong University, China
Weijia Jia, City University of Hong Kong, Hong Kong
Jie Li, University of Tsukuba, Japan
Jianhua Ma, Hosei University, Japan
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
Indrakshi Ray, Colorado State University, USA
Kouichi Sakurai, Kyushu University, Japan
Srinivas Sampalli, Dalhousie University, Canada
Ivan Stojmenovic, University of Ottawa, Canada
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Wanlei Zhou, Deakin University, Australia
Program Committee (in alphabetical order)
Please check the conferencee website for the whole list.
Organizing Committee
Zhaohui Dai, Central South University, China
Ming Fu, Changsha University of Science and Technology, China
Zhigang Hu, Central South University, China
Changyun Li, Hunan University of Technology, China
Hui Li, Central South University, China
Kenli Li, Hunan University, China
Hong Liu, Hunan Normal University, China
Jianxun Liu, Hunan University of Science and Technology, China
Renren Liu, Xiangtan University, China
Xinjun Mao, National University of Defense Technology, China
Ronghua Shi, Central South University, China
Jianxin Wang, Central South University, China
Beiji Zou, Central South University, China
Secretariats
Pin Liu, Central South University, China
Yongming Xie, Central South University, China
Webmasters
Qian Li, Central South University, China
Xiaofei Xing, Central South University, China
Contact
Please email inquiries concerning IEEE TrustCom 2011 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the conference organizers: TrustCom2011 AT gmail DOT com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Symposiums/Workshops for IEEE TrustCom 2011
(1) The Third IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe 2011)
http://trust.csu.edu.cn/conference/UbiSafe2011/
Main Organizers:
Prof. Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Prof. Hamid Sharif, University of Nebraska-Lincoln, USA
Prof. Xiaolin (Andy) Li, University of Florida, USA
(2) The Third IEEE International Workshop on Security in e-Science and e-Research (IEEE ISSR 2011)
http://trust.csu.edu.cn/conference/ISSR2011/
Main Organziers:
Prof. Richard Sinnott, University of Melbourne, Australia
Prof. Jie Wei, University of West London, UK
Prof. Kouichi Sakurai, Kyushu University, Japan
(3) The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)
http://trust.csu.edu.cn/conference/SPIoT2011/
Main Organizers:
Prof. Indrakshi Ray, Colorado State University, USA
Prof. John Fiore, Temple University, USA
Prof. Weirong Liu, Central South University, China
(4) The 2011 IEEE International Workshop on Anonymity and Communication Networks (IEEE ACN 2011)
http://trust.csu.edu.cn/conference/ACS2011/
Main Organizers:
Prof. Jianhua Ma, Hosei University, Japan
Prof. Guihua Duan, Central South University, China
(5) The 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (IEEE TrustID 2011)
http://trust.csu.edu.cn/conference/TrustID2011/
Main Organizers:
Prof. Zheng Yan, Aalto University, Finland/XiDian University, China
Prof. Raimo Kantola, Aalto University, Finland
Prof. Peng Zhang, Xi'an University of Post and Telecommunications, China
(6) The 2011 IEEE International Workshop on Security and Quantum Communications (IEEE SQC 2011)
http://trust.csu.edu.cn/conference/SQC2011/
Main Organizers:
Prof. Ronghua Shi, Central South University, China
Prof. Guihua Zeng, Shanghai Jiao Tong University, China
Prof. Ying Guo, Central South University, China
(7) The 2011 IEEE International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011)
http://tscloud.org/
Main Organizers:
Prof. Ryan K. L. Ko, Hewlett Packard Laboratories, Singapore
Prof. Markus Kirchberg, Hewlett Packard Laboratories, Singapore
---------------------------------------------------------------------------------
1
0