STA 2015 - 12nd FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2015)
Topics/Call fo Papers
Information technology issue is emerging rapidly as an exciting new paradigm
with user-centric environment to provide computing and communication services.
In order to realize IT advantages, it requires integrating security and data management
to be suitable for future computing environments. However, there are still many
problems and major challenges waiting for us to solve such as the security risks
in resource sharing, which could be occurred when data resources are connected and
accessed by anyone. Therefore, it will be needed to explore more secure and
trust and intelligent data management mechanism.
The STA 2015 addresses the various theories and practical applications of secure and
trust computing and data management in future environments. It will present important
results of significant value to solve the application services and various problems
within the scope of STA 2015. In addition, we expect it will trigger further related
research and technology developments which will improve our lives in the future.
The STA 2015 is the next edition of STA 2014, (Ostrava, Czech Republic), STA 2013 (Fukouka, Japan, 2013),STA 2012 (Gwangju, Korea, 2012),
STA 2011 (Loutraki, Greece, 2011).
===
Topics
===
The conference includes, but is not limited to, the areas listed below:
Track 1. Security and Trust computing
- Authentication and access control
- Anonymity, identity management
- Cryptographic protocols
- Data integrity, dependability
- Digital right management and intellectual property protection
- Accountability
- Applied cryptography
- Cybercrime and computer forensics
- Denial of service attacks
- Formal methods in security
- Information warfare
- Steganography and watermarking
- Intrusion tolerance
- System and network security
- Multimedia security
- Smartphone security issues
- Security for open convergence system
- Security for M2M platform
- Security and privacy issues for intelligent vehicular systems and communications
- Security issues for broadband convergence network
- IPTV security services
- Privacy-enhancing technology
- Security evaluation and management
- Security requirements engineering
- trust models and trust management policies
- Mobile trusted computing
- Trustworthy infrastructures and services for cloud computing
- Cryptographic aspects of trusted computing
- Establishing trust in embedded systems
- Virtualization for trusted platforms
- Verification of trusted computing architectures
Track 2. Data Management and Computational Intelligence
- Data and information modelling
- Data and information networks
- Data structures and data management algorithms
- Data warehousing
- Big dat and Cloud center
- Distributed, parallel, P2P, and Grid-based databases
- Pervasive data and information
- Semantic web and ontologies
- Sensor data management
- WWW, XML, and databases
- Context-awareness and data mining
- Human-computer interface and interaction
- Smart homes / building and business model
- Intelligent multimedia services
- Smart sensor / RFID
- Intelligent pervasive computing
- Electronic / ubiquitous commerce and services
- Engineering information systems
- Enterprise data management / resource Planning
- Geographic information systems
- Mobile computing and data management
- System design and implementation using data management
- New novel mechanism and applications
- Cluster technologies
- Grid and cloud domputing
- Community and collaborative computing networks
- Support for autonomic grid infrastructure
- Resource management
- Grid-based problem olving environments
- System design and implementation using data management
- Social data management
- Pattern recognition
- Visual data analysis
- Image understanding
- Cognitive informatics
- New novel mechanism and applications
with user-centric environment to provide computing and communication services.
In order to realize IT advantages, it requires integrating security and data management
to be suitable for future computing environments. However, there are still many
problems and major challenges waiting for us to solve such as the security risks
in resource sharing, which could be occurred when data resources are connected and
accessed by anyone. Therefore, it will be needed to explore more secure and
trust and intelligent data management mechanism.
The STA 2015 addresses the various theories and practical applications of secure and
trust computing and data management in future environments. It will present important
results of significant value to solve the application services and various problems
within the scope of STA 2015. In addition, we expect it will trigger further related
research and technology developments which will improve our lives in the future.
The STA 2015 is the next edition of STA 2014, (Ostrava, Czech Republic), STA 2013 (Fukouka, Japan, 2013),STA 2012 (Gwangju, Korea, 2012),
STA 2011 (Loutraki, Greece, 2011).
===
Topics
===
The conference includes, but is not limited to, the areas listed below:
Track 1. Security and Trust computing
- Authentication and access control
- Anonymity, identity management
- Cryptographic protocols
- Data integrity, dependability
- Digital right management and intellectual property protection
- Accountability
- Applied cryptography
- Cybercrime and computer forensics
- Denial of service attacks
- Formal methods in security
- Information warfare
- Steganography and watermarking
- Intrusion tolerance
- System and network security
- Multimedia security
- Smartphone security issues
- Security for open convergence system
- Security for M2M platform
- Security and privacy issues for intelligent vehicular systems and communications
- Security issues for broadband convergence network
- IPTV security services
- Privacy-enhancing technology
- Security evaluation and management
- Security requirements engineering
- trust models and trust management policies
- Mobile trusted computing
- Trustworthy infrastructures and services for cloud computing
- Cryptographic aspects of trusted computing
- Establishing trust in embedded systems
- Virtualization for trusted platforms
- Verification of trusted computing architectures
Track 2. Data Management and Computational Intelligence
- Data and information modelling
- Data and information networks
- Data structures and data management algorithms
- Data warehousing
- Big dat and Cloud center
- Distributed, parallel, P2P, and Grid-based databases
- Pervasive data and information
- Semantic web and ontologies
- Sensor data management
- WWW, XML, and databases
- Context-awareness and data mining
- Human-computer interface and interaction
- Smart homes / building and business model
- Intelligent multimedia services
- Smart sensor / RFID
- Intelligent pervasive computing
- Electronic / ubiquitous commerce and services
- Engineering information systems
- Enterprise data management / resource Planning
- Geographic information systems
- Mobile computing and data management
- System design and implementation using data management
- New novel mechanism and applications
- Cluster technologies
- Grid and cloud domputing
- Community and collaborative computing networks
- Support for autonomic grid infrastructure
- Resource management
- Grid-based problem olving environments
- System design and implementation using data management
- Social data management
- Pattern recognition
- Visual data analysis
- Image understanding
- Cognitive informatics
- New novel mechanism and applications
Other CFPs
- 5th International Conference on Intelligent Robotics, Automations, Telecommunication facilities, and applications (IRoA 2015)
- 2nd Workshop on Scalable Machine Learning: Theory and Applications
- The 3rd International Conference on Social Science and Management
- 2014 International Conference on Management, Information and Educational Engineering
- 2014 International Conference on Civil, Materials and Computing Engineering
Last modified: 2014-07-20 15:58:27