RATSP 2015 - 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications
Topics/Call fo Papers
With the rapid development and increasing complexity of computer and communication systems, user requirements for trust, security and privacy are becoming more and more demanding. Traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing and communications environments. New challenges attract scientific and technical exploration and investigation to allow users to enjoy more advanced services and applications while preserving trust, security and privacy at the same time.
This symposium focuses on innovative methods and techniques for addressing on trusted computing and communications. It aims to provide a forum to discuss recent advances on all aspects of Trust, Security and Privacy in Computing and Communications.
Scope and Interests
Topics of interests include but are not limited to:
Trust semantics, metrics and models
Trusted computing platform
Trusted network computing
Trusted operating systems
Trusted and secure software and applications
Trust, security and privacy in social networks
Trust, security and privacy in grid/cloud/pervasive computing
Trust, security and privacy in parallel and distributed systems
Trust, security and privacy in e-commerce and e-government
Risk and reputation management
Trust, security and privacy in mobile and wireless communications
Trust, security and privacy of 5G
Trust, security and privacy in database systems
Trust, security and privacy of web applications and services
Trust, security and privacy in network deployment and management
Network security
Computer security
Policy, model and architecture of trust, security and privacy
Authentication, authorization and accounting
Submission and Publication Instructions
Submitted papers must not overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf).
Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected best papers will be published in high quality international journals.
Important Dates
Submission deadline: May 25th, 2015
Authors notification: June 10th, 2015
Camera-ready due: July 1st, 2015
Registration: July 1st, 2015
General Co-Chairs
Zheng Yan, Xidian University, China
Peter Mueller, IBM Zurich, Switzerland
Program Co-Chairs
Xiangjian (Sean) He, University of Technology, Sydney, Australia
Xinyi Huang, Fujian Normal University, China
Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy
This symposium focuses on innovative methods and techniques for addressing on trusted computing and communications. It aims to provide a forum to discuss recent advances on all aspects of Trust, Security and Privacy in Computing and Communications.
Scope and Interests
Topics of interests include but are not limited to:
Trust semantics, metrics and models
Trusted computing platform
Trusted network computing
Trusted operating systems
Trusted and secure software and applications
Trust, security and privacy in social networks
Trust, security and privacy in grid/cloud/pervasive computing
Trust, security and privacy in parallel and distributed systems
Trust, security and privacy in e-commerce and e-government
Risk and reputation management
Trust, security and privacy in mobile and wireless communications
Trust, security and privacy of 5G
Trust, security and privacy in database systems
Trust, security and privacy of web applications and services
Trust, security and privacy in network deployment and management
Network security
Computer security
Policy, model and architecture of trust, security and privacy
Authentication, authorization and accounting
Submission and Publication Instructions
Submitted papers must not overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf).
Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected best papers will be published in high quality international journals.
Important Dates
Submission deadline: May 25th, 2015
Authors notification: June 10th, 2015
Camera-ready due: July 1st, 2015
Registration: July 1st, 2015
General Co-Chairs
Zheng Yan, Xidian University, China
Peter Mueller, IBM Zurich, Switzerland
Program Co-Chairs
Xiangjian (Sean) He, University of Technology, Sydney, Australia
Xinyi Huang, Fujian Normal University, China
Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy
Other CFPs
- RW- 6th International Conference on Power Control and Embedded System (ICPCES)
- RW- 6th International Conference on Medical and Biosciences (ICMBS)
- RW- 6th International Conference on Chemical and Biochemical Engineering (ICCBE)
- RW- 6th International Conference on Applied Physics and Mathematics (ICAPM)
- RW-6th International Conference on Arts, Education and Social Science (ICAES)
Last modified: 2015-06-20 16:23:40