STA 2014 - The 11st FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2014)
Topics/Call fo Papers
Information technology issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services.
In order to realize IT advantages, it requires integrating security and data management to be suitable for future computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in resource sharing, which could be occurred when data resources are connected and accessed by anyone. Therefore, it will be needed to explore more secure and trust and intelligent data management mechanism.
STA 2013 addresses the various theories and practical applications of secure and trust computing and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of STA 2014. In addition, we expect it will trigger further related
research and technology developments which will improve our lives in the future.
STA 2014 is the next edition of STA 2013 (Fukouka, Japan , 2013), STA 2012 (Gwangju, Korea , 2012), STA 2011
(Loutraki, Greece, 2011), SSDU-10(Xi'an, China, 2010), SSDU-08
(Kunming, China, 2008), SSDU-07 (Nanjing, China, 2007), UC-Sec 09 (Las Vegas, USA, 2009)
and TRUST-08 (Shanghai, China, 2008), TRUST-07 (Taipei, Taiwan, 2007), TRUST-06 (Seoul, Korea, 2006).
====================
Topics
====================
The conference includes, but is not limited to, the areas listed below:
[Security and Trust computing]
- Authentication and access control
- Anonymity, identity management
- Cryptographic protocols
- Data integrity, dependability
- Digital right management and intellectual property protection
- Accountability
- Applied cryptography
- Cybercrime and computer forensics
- Denial of service attacks
- Formal methods in security
- Information warfare
- Steganography and watermarking
- Intrusion tolerance
- System and network security
- Multimedia security
- Smartphone security issues
- Security for open convergence system
- Security for M2M platform
- Security and privacy issues for intelligent vehicular systems and communications
- Security issues for broadband convergence network
- IPTV security services
- Privacy-enhancing technology
- Security evaluation and management
- Security requirements engineering
- trust models and trust management policies
- Mobile trusted computing
- Trustworthy infrastructures and services for cloud computing
- Cryptographic aspects of trusted computing
- Establishing trust in embedded systems
- Virtualization for trusted platforms
- Verification of trusted computing architectures
[Data management]
- Data and information modelling
- Data and information networks
- Data structures and data management algorithms
- Data warehousing
- Distributed, parallel, P2P, and Grid-based databases
- Pervasive data and information
- Semantic web and ontologies
- Sensor data management
- WWW, XML, and databases
- Context-awareness and data mining
- Human-computer interface and interaction
- Smart homes / building and business model
- Intelligent multimedia services
- Smart sensor / RFID
- Intelligent pervasive computing
- Electronic / ubiquitous commerce and services
- Engineering information systems
- Enterprise data management / resource Planning
- Geographic information systems
- Mobile computing and data management
- System design and implementation using data management
- New novel mechanism and applications
- Cluster technologies
- Grid and cloud domputing
- Community and collaborative computing networks
- Support for autonomic grid infrastructure
- Resource management
- Grid-based problem olving environments
- System design and implementation using data management
- New novel mechanism and applications
In order to realize IT advantages, it requires integrating security and data management to be suitable for future computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in resource sharing, which could be occurred when data resources are connected and accessed by anyone. Therefore, it will be needed to explore more secure and trust and intelligent data management mechanism.
STA 2013 addresses the various theories and practical applications of secure and trust computing and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of STA 2014. In addition, we expect it will trigger further related
research and technology developments which will improve our lives in the future.
STA 2014 is the next edition of STA 2013 (Fukouka, Japan , 2013), STA 2012 (Gwangju, Korea , 2012), STA 2011
(Loutraki, Greece, 2011), SSDU-10(Xi'an, China, 2010), SSDU-08
(Kunming, China, 2008), SSDU-07 (Nanjing, China, 2007), UC-Sec 09 (Las Vegas, USA, 2009)
and TRUST-08 (Shanghai, China, 2008), TRUST-07 (Taipei, Taiwan, 2007), TRUST-06 (Seoul, Korea, 2006).
====================
Topics
====================
The conference includes, but is not limited to, the areas listed below:
[Security and Trust computing]
- Authentication and access control
- Anonymity, identity management
- Cryptographic protocols
- Data integrity, dependability
- Digital right management and intellectual property protection
- Accountability
- Applied cryptography
- Cybercrime and computer forensics
- Denial of service attacks
- Formal methods in security
- Information warfare
- Steganography and watermarking
- Intrusion tolerance
- System and network security
- Multimedia security
- Smartphone security issues
- Security for open convergence system
- Security for M2M platform
- Security and privacy issues for intelligent vehicular systems and communications
- Security issues for broadband convergence network
- IPTV security services
- Privacy-enhancing technology
- Security evaluation and management
- Security requirements engineering
- trust models and trust management policies
- Mobile trusted computing
- Trustworthy infrastructures and services for cloud computing
- Cryptographic aspects of trusted computing
- Establishing trust in embedded systems
- Virtualization for trusted platforms
- Verification of trusted computing architectures
[Data management]
- Data and information modelling
- Data and information networks
- Data structures and data management algorithms
- Data warehousing
- Distributed, parallel, P2P, and Grid-based databases
- Pervasive data and information
- Semantic web and ontologies
- Sensor data management
- WWW, XML, and databases
- Context-awareness and data mining
- Human-computer interface and interaction
- Smart homes / building and business model
- Intelligent multimedia services
- Smart sensor / RFID
- Intelligent pervasive computing
- Electronic / ubiquitous commerce and services
- Engineering information systems
- Enterprise data management / resource Planning
- Geographic information systems
- Mobile computing and data management
- System design and implementation using data management
- New novel mechanism and applications
- Cluster technologies
- Grid and cloud domputing
- Community and collaborative computing networks
- Support for autonomic grid infrastructure
- Resource management
- Grid-based problem olving environments
- System design and implementation using data management
- New novel mechanism and applications
Other CFPs
- International Symposium on System Engineering and Computer Simulation (SECS-2013)
- The 2013 International Symposium on Advanced Information, Electronics, and Communication Technology and Application (IECT 2013)
- International Workshop on Advances in Social Media Applications
- First International Workshop on Cloud Computing and Cloud Applications(CCCA’13)
- International Workshop on Computational Intelligence and its Applications
Last modified: 2013-07-23 22:04:25