CyberTrust 2014 - Second International Workshop on Trust and Privacy in Cyberspace (CyberTrust'14)
Topics/Call fo Papers
Traditional security mechanisms typically protect resources from malicious users, by restricting access to only authorized users. In many situations we have to protect ourselves from those who offer resources/services so that the problem in fact is reversed. For example, information providers can act deceitfully by providing false or misleading information. Malicious or improper usages like the above attacks cannot be addressed by traditional security solutions. These issues relate more with trustworthiness rather than security. In distributed, open systems, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is widely used. At the same time, the privacy is also of prime importance while communicating over publicly spanned network like web. A service provider as well as service requester or consumer must be allowed to define and enforce privacy policies to protect sensitive information like personal information, credit history of a customer or some confidential data etc. The International Workshop on Trust and Privacy in Cyberspace (CyberTrust'14) aims to establish a state of the art for trust management and privacy protection, and to provide a forum for exchange of ideas among researchers working on these areas.
Other CFPs
- Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2014)
- Second International Workshop on Security in Self-Organizing Networks (SelfNet'14)
- ACM International Conference on Interactive Experiences for TV and Online Video
- 7th International Workshop on Information Filtering and Retrieval
- Canadian Conference on Computer and Robot Vision
Last modified: 2013-09-08 22:01:57