ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

TC 2018 - IEEE International Workshop on Trustworthy Computing

Date2018-07-16 - 2018-07-20

Deadline2018-03-15

VenueLisbon, Portugal Portugal

Keywords

Websitehttp://paris.utdallas.edu/qrs18/index.html

Topics/Call fo Papers

Trustworthy Computing (TC) aims at providing secure, private, and reliable computing experiences in a world where computing has become a necessity for many aspects of life. While decades have passed since the concept of trustworthy computing was introduced for military, financial, and public safety related computing systems, trustworthy computing still remains one of the key issues in the design and operation of computing systems nowadays. The ever-growing complexity of computing systems, the shift of trust to a third-party cloud service provider, and the widespread use of computing devices have made it much more difficult to implement trustworthy computing. In view of the challenges, the TC workshop is formed in conjunction with QRS 2018 to call for innovative work on the design and application of trustworthy computing. Reviews and case studies which address state-of-art research and state-of-practice industry experiences are also welcomed.
The topics of interest include, but are not limited to:
Policies and models of trustworthy computing
Security, reliability, and availability issues in computing systems and networks
Censorship, anonymity, and privacy issues
Trustworthy mobile and cloud computing
Smart grid, SCADA, and critical information infrastructure
The implication of Internet of Things on trustworthy computing
Online social network and human factor issues
Effective security protection and management of big data
Industrial control devices, portable devices and applications
Hardware support for trustworthy computing
Detection, prevention, and response to malware and security attacks
Information, system, and software assurance
Auditing, verification, and validation
Security testing, evaluation, and measurement
Data protection, maintenance, recovery, and risk assessment
Authentication, authorization, access control, and accounting
Software defined networking (SDN)
Cryptographic techniques
Adversarial machine learning

Last modified: 2018-01-13 15:09:40