STA 2011 - The 8th IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011)
Topics/Call fo Papers
STA 2011 Call for Papers
STA 2011
The 8th IEEE/FTRA International Conference on
Secure and Computing, data management, and Applications (STA 2011)
Crete, Greece, June 28 - 30, 2011
http://www.ftrai.org/sta2011
STA 2011 Overview
Information technology issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services.
In order to realize IT advantages, it requires integrating security and data management to be suitable for future computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in resource sharing, which could be occurred when data resources are connected and accessed by anyone.
Therefore, it will be needed to explore more secure and trust and intelligent data management mechanism.
STA 2011 addresses the various theories and practical applications of secure and trust computing and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of STA 2011.
In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.
STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held as SSDU-10(Xi'an, China, 2010), SSDU-08(Kunming, China, 2008), SSDU-07(Nanjing, China, 2007), UC-Sec 09(Las Vegas, USA, 2009) and TRUST-08(Shanghai, China, 2008), TRUST-07(Taipei, Taiwan, 2007), TRUST-06(Seoul, Korea, 2006).
Topics
The conference includes, but is not limited to, the areas listed below:
[Security and Trust computing]
- Authentication and access control
- Anonymity, identity management
- Cryptographic protocols
- Data integrity, dependability
- Digital right management and intellectual property protection
- Accountability
- Applied cryptography
- Cybercrime and computer forensics
- Denial of service attacks
- Formal methods in security
- Information warfare
- Steganography and watermarking
- Intrusion tolerance
- System and network security
- Multimedia security
- Smartphone security issues
- Security for open convergence system
- Security for M2M platform
- Security and privacy issues for intelligent vehicular systems and communications
- Security issues for broadband convergence network
- IPTV security services
- Privacy-enhancing technology
- Security evaluation and management
- Security requirements engineering
- trust models and trust management policies
- Mobile trusted computing
- Trustworthy infrastructures and services for cloud computing
- Cryptographic aspects of trusted computing
- Establishing trust in embedded systems
- Virtualization for trusted platforms
- Verification of trusted computing architectures
[Data management]
- Data and information modelling
- Data and information networks
- Data structures and data management algorithms
- Data warehousing
- Distributed, parallel, P2P, and Grid-based databases
- Pervasive data and information
- Semantic web and ontologies
- Sensor data management
- WWW, XML, and databases
- Context-awareness and data mining
- Human-computer interface and interaction
- Smart homes / building and business model
- Intelligent multimedia services
- Smart sensor / RFID
- Intelligent pervasive computing
- Electronic / ubiquitous commerce and services
- Engineering information systems
- Enterprise data management / resource Planning
- Geographic information systems
- Mobile computing and data management
- System design and implementation using data management
- New novel mechanism and applications
- Cluster technologies
- Grid and cloud domputing
- Community and collaborative computing networks
- Support for autonomic grid infrastructure
- Resource management
- Grid-based problem solving environments
- System design and implementation using data management
- New novel mechanism and applications
Important Dates
Workshop Proposal Due: Nov. 1, 2010
Paper Submission Deadline: Dec. 15, 2010
Paper Status Notification: Mar. 1, 2011
Camera-ready Due: April 1, 2010
Conference events: June 28 - 30, 2011
Submission and Proceeding
There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this conference. Authors should submit a paper with 4-6 pages in length, including all figures, tables, and references. If you want to submit more than page limitation, you can add up to 2 extra pages with the appropriate fee payment.
Please use the IEEE Conference Proceedings format (US letter size, available for download here: IEEE Manuscript Templates for Conference Proceedings) for submission. The Conference Proceedings will be published by IEEE Press (IEEE eXpress Conference Publishing group) and all papers of the proceedings will be included in the IEEE Xplorer¢â (indexed in EI).
Submission system:
[Security and Trust computing] http://www.editorialsystem.net/sta11/stc
[Data management] http://www.editorialsystem.net/sta11/dm
Organization
Steering Chair
Jong Hyuk Park, Seoul National University of Technology, Korea
General Chairs
David Chadwick, University of Kent, UK
Javier Lopez, University of Malaga, Spain
Sang-Soo Yeo, Mokwon University, Korea
General Vice-chair
Changhoon Lee, Hanshin University, Korea
Program Chairs
[Security and Trust Computing Track]
Taeshik Shon, Samsung Electronics, Korea
Lambrinoudakis Costas, University of the Aegean, Greece
[Data Management Track]
David Taniar, Monash University, Australia
Andreas Wombacher, University of Twente, The Netherlands
Workshop Chairs
[Security and Trust Computing Track]
Jean-Marc Seigneur, University of Geneva, Switzerland
Panagiotis Rizomiliotis, University of the Aegean, Greece
[Data Management Track]
Roland R. Wagner, University of Linz, Austria
Xiaofang Zhou, The University of Queensland, Australia
International Advisory Board
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Gail-Joon Ahn, Arizona State University, USA
Wanlei Zhou, Deakin University, Australia
Stefanos Gritzalis, University of the Aegean, Greece
Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan
Feng Bao, Institute for Infocomm Research (I2R), Singapore
Xiaobo Zhou, University of Colorado at Colorado Springs, USA
Tok Wang LING, National University of Singapore, Singapore
Philip S. Yu, University of Illinois at Chicago, USA
Publicity Chairs
Sotiris Ioannidis, Foundation for Research and Technology, Greece
Jong-Hyouk Lee, INRIA, France
Andreas Wombacher, University of Twente, The Netherlands
Deqing Zou, Huazhong University of Science andTechnology, China
Lei Shu, Osaka University, Japan
International Liaison Chairs
Guojun Wang, Central South University, P. R. China
Bernady O. Apduhan, Kyushu Sangyo University, Japan
Jongsung Kim, Kyungnam University, Korea
Contact Information
If you have any questions about the CfP and papers submission,
please email to Prof. Sang-Soo Yeo (ssyeo-AT-msn.com) and Dr. TS Shon (743zh2k-AT-gmail.com).
-The End-
STA 2011
The 8th IEEE/FTRA International Conference on
Secure and Computing, data management, and Applications (STA 2011)
Crete, Greece, June 28 - 30, 2011
http://www.ftrai.org/sta2011
STA 2011 Overview
Information technology issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services.
In order to realize IT advantages, it requires integrating security and data management to be suitable for future computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in resource sharing, which could be occurred when data resources are connected and accessed by anyone.
Therefore, it will be needed to explore more secure and trust and intelligent data management mechanism.
STA 2011 addresses the various theories and practical applications of secure and trust computing and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of STA 2011.
In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.
STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held as SSDU-10(Xi'an, China, 2010), SSDU-08(Kunming, China, 2008), SSDU-07(Nanjing, China, 2007), UC-Sec 09(Las Vegas, USA, 2009) and TRUST-08(Shanghai, China, 2008), TRUST-07(Taipei, Taiwan, 2007), TRUST-06(Seoul, Korea, 2006).
Topics
The conference includes, but is not limited to, the areas listed below:
[Security and Trust computing]
- Authentication and access control
- Anonymity, identity management
- Cryptographic protocols
- Data integrity, dependability
- Digital right management and intellectual property protection
- Accountability
- Applied cryptography
- Cybercrime and computer forensics
- Denial of service attacks
- Formal methods in security
- Information warfare
- Steganography and watermarking
- Intrusion tolerance
- System and network security
- Multimedia security
- Smartphone security issues
- Security for open convergence system
- Security for M2M platform
- Security and privacy issues for intelligent vehicular systems and communications
- Security issues for broadband convergence network
- IPTV security services
- Privacy-enhancing technology
- Security evaluation and management
- Security requirements engineering
- trust models and trust management policies
- Mobile trusted computing
- Trustworthy infrastructures and services for cloud computing
- Cryptographic aspects of trusted computing
- Establishing trust in embedded systems
- Virtualization for trusted platforms
- Verification of trusted computing architectures
[Data management]
- Data and information modelling
- Data and information networks
- Data structures and data management algorithms
- Data warehousing
- Distributed, parallel, P2P, and Grid-based databases
- Pervasive data and information
- Semantic web and ontologies
- Sensor data management
- WWW, XML, and databases
- Context-awareness and data mining
- Human-computer interface and interaction
- Smart homes / building and business model
- Intelligent multimedia services
- Smart sensor / RFID
- Intelligent pervasive computing
- Electronic / ubiquitous commerce and services
- Engineering information systems
- Enterprise data management / resource Planning
- Geographic information systems
- Mobile computing and data management
- System design and implementation using data management
- New novel mechanism and applications
- Cluster technologies
- Grid and cloud domputing
- Community and collaborative computing networks
- Support for autonomic grid infrastructure
- Resource management
- Grid-based problem solving environments
- System design and implementation using data management
- New novel mechanism and applications
Important Dates
Workshop Proposal Due: Nov. 1, 2010
Paper Submission Deadline: Dec. 15, 2010
Paper Status Notification: Mar. 1, 2011
Camera-ready Due: April 1, 2010
Conference events: June 28 - 30, 2011
Submission and Proceeding
There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this conference. Authors should submit a paper with 4-6 pages in length, including all figures, tables, and references. If you want to submit more than page limitation, you can add up to 2 extra pages with the appropriate fee payment.
Please use the IEEE Conference Proceedings format (US letter size, available for download here: IEEE Manuscript Templates for Conference Proceedings) for submission. The Conference Proceedings will be published by IEEE Press (IEEE eXpress Conference Publishing group) and all papers of the proceedings will be included in the IEEE Xplorer¢â (indexed in EI).
Submission system:
[Security and Trust computing] http://www.editorialsystem.net/sta11/stc
[Data management] http://www.editorialsystem.net/sta11/dm
Organization
Steering Chair
Jong Hyuk Park, Seoul National University of Technology, Korea
General Chairs
David Chadwick, University of Kent, UK
Javier Lopez, University of Malaga, Spain
Sang-Soo Yeo, Mokwon University, Korea
General Vice-chair
Changhoon Lee, Hanshin University, Korea
Program Chairs
[Security and Trust Computing Track]
Taeshik Shon, Samsung Electronics, Korea
Lambrinoudakis Costas, University of the Aegean, Greece
[Data Management Track]
David Taniar, Monash University, Australia
Andreas Wombacher, University of Twente, The Netherlands
Workshop Chairs
[Security and Trust Computing Track]
Jean-Marc Seigneur, University of Geneva, Switzerland
Panagiotis Rizomiliotis, University of the Aegean, Greece
[Data Management Track]
Roland R. Wagner, University of Linz, Austria
Xiaofang Zhou, The University of Queensland, Australia
International Advisory Board
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Gail-Joon Ahn, Arizona State University, USA
Wanlei Zhou, Deakin University, Australia
Stefanos Gritzalis, University of the Aegean, Greece
Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan
Feng Bao, Institute for Infocomm Research (I2R), Singapore
Xiaobo Zhou, University of Colorado at Colorado Springs, USA
Tok Wang LING, National University of Singapore, Singapore
Philip S. Yu, University of Illinois at Chicago, USA
Publicity Chairs
Sotiris Ioannidis, Foundation for Research and Technology, Greece
Jong-Hyouk Lee, INRIA, France
Andreas Wombacher, University of Twente, The Netherlands
Deqing Zou, Huazhong University of Science andTechnology, China
Lei Shu, Osaka University, Japan
International Liaison Chairs
Guojun Wang, Central South University, P. R. China
Bernady O. Apduhan, Kyushu Sangyo University, Japan
Jongsung Kim, Kyungnam University, Korea
Contact Information
If you have any questions about the CfP and papers submission,
please email to Prof. Sang-Soo Yeo (ssyeo-AT-msn.com) and Dr. TS Shon (743zh2k-AT-gmail.com).
-The End-
Other CFPs
- The 5th IEEE/FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2011)
- 7th International Conference on Global Software Engineering (ICGSE)
- 2011 45th Annual Conference on Information Sciences and Systems (CISS)
- 2010 Third International Conference on Education Technology and Training (ETT)
- Environmental Pollution and Public Health (EPPH2011) Special Track within iCBBE2011
Last modified: 2010-08-05 15:13:41