posted by user: pengzhangyz || 6472 views || tracked by 13 users: [display]

IEEE TrustID 2011 : 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications

FacebookTwitterLinkedInGoogle

Link: http://trust.csu.edu.cn/conference/TrustID2011/
 
When Nov 16, 2011 - Nov 18, 2011
Where Changsha China
Submission Deadline Jun 30, 2011
Notification Due Aug 30, 2011
Final Version Due Sep 30, 2011
Categories    trust   identity   security   privacy
 

Call For Papers

The 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications
(IEEE TrustID 2011)
http://trust.csu.edu.cn/conference/TrustID2011/
In conjunction with
The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)
November 16-18, 2011, Changsha, China
(http://trust.csu.edu.cn/conference/TrustCom2011/)

Call for Papers
Trust and identity have become important factors that influence the success of our mobile life. Current research in trust and identity still faces a number of challenges, e.g. trustworthiness of trust/identity management systems, usability and robustness of trust/identity management, trust and identity management with privacy enhancement, adaptability and scalability issues, efficient power consumption support, etc. Due to dynamically changed computing environments, mobility, limited computing capability, restricted user interface for human-device interaction, instant communication characteristics and user privacy requirements, these challenges are more difficult to overcome in the context of mobile internet, computing and communications. TrustID 2011 aims at providing a forum for discussing the latest academic and industrial research results related to trust and identity in the area of mobile internet, computing and communications. Topics of interest include, but are not limited to:

 Perspective of trust and identity and their development
 Architecture, theories and technologies of trust/identity management
 Trust modeling methodologies
 Mobile computing trust technologies, trust evaluation, reputation/recommender systems
 Technologies and theories of identity management
 Digital identity management for trust and privacy enhancement
 Systems, applications and standardizations about trust and identity
 Applications and case studies of trust and identity systems
 Challenges and issues for practical deployment of trust and identity management systems
 Social and psychological issues of trust and identity
 Business issues related to trust and identity
 Human-computer interaction for trust and identity
 Usable trust and identity studies

Publication
All accepted papers from this workshop will be published by IEEE Computer Society in TrustCom-11 conference/workshop proceedings (indexed by EI Compendex and ISTP). Distinguished papers, after further revisions, will be invited for possible publication in special issues of prestige international journals indexed by SCI and EI (pending).

Important Dates
Paper submissions due: June 30, 2011
Notification of decision: August 30, 2011
Camera-ready papers due: September 30, 2011

Submission Instructions
All submissions should be written in English with a maximum length of 6 pages (or 10 pages with the over length charge) in the IEEE Conference Proceedings Format. Submissions should be sent by email to Prof. Peng Zhang (pengzhangzhang@gmail.com) and cc-emailed to the workshop organizers (TrustID2011@gmail.com) with the subject "TrustID2011 WORKSHOP PAPER SUBMISSION+First Author".

Program Co-Chairs
Zheng Yan
Aalto University, Finland/XiDian University, China
Raimo Kantola
Aalto University, Finland
Peng Zhang
Xi’an University of Post and Telecommunications, China

PC Members (In alphabetical order)
Pierre Abi-Char, American University of Technology, Lebanon
Yu Chen, EPFL, Switzerland
Alvin Chin, Nokia Research Center, China
Piotr Cofta, British Telecom, UK
Ioanna Dionysiou, University of Nicosia, Cyprus
Yan Dong, Renmin University of China, China
Weili Han, Fudan University, China
Silke Holtmanns, Nokia Research Center, Finland
Yu Hua, Huazhong University of Science and Technology, China
Gabriele Lenzini, University of Luxembourg, Luxembourg
Abdallah Mahamed, Institut TELECOM, France
Yuexin Peng, Beijing University of Post and Telecommunications, China
Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy
Lei Shu, Osaka University, Japan
Qinghua Wang, Aalto University, Finland
Junze Wang, Huazhong University of Science and Technology, China
Yan Wang, Macquarie University, Australia
Andrew G. West, University of Pennsylvania, USA
Dajiang Zhang, Nokia, China
Yan Zhang, Simula Research Laboratory, Norway

Contact

Please email inquiries concerning TrustID 2011 to:
Prof. Peng Zhang (pengzhangzhang@gmail.com) and the workshop organizers (TrustID2011@gmail.com).

Related Resources

IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IEEE MASS 2019   The 16th IEEE International Conference on Mobile Ad-Hoc and Smart Systems
ESORICS 2019   The 24th European Symposium on Research in Computer Security
ICMLA 2019   18th IEEE International Conference on Machine Learning and Applications
TrustCom 2019   The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
PerFoT 2019   2019 International Workshop on Pervasive Flow of Things (Co-located with IEEE PerCom 2019)
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
SSCI 2019   The 2019 IEEE Symposium Series on Computational Intelligence
CLOUD 2019   8th International Conference on Cloud Computing: Services and Architecture