posted by organizer: seigneuj || 1712 views || tracked by 7 users: [display]

TRECK 2015 : ACM SAC'15 TRECK (trust/reputation) track CFP


When Apr 13, 2015 - Apr 17, 2015
Where Salamanca, Spain
Submission Deadline Sep 12, 2014
Notification Due Nov 17, 2014
Final Version Due Dec 8, 2014
Categories    trust   e-rã©putation   online reputation   privacy

Call For Papers

(We apologize if you receive multiple copies of this message)


The 30th ACM Symposium on Applied Computing
13-17 April 2015, Salamanca, Spain

Track: Trust, Reputation, Evidence and other Collaboration Know-how (TRECK)

Proceedings: ACM printed form, ACM CD-ROM and ACM digital library

Aims and scope of the TRECK track:

Computational models of trust and online reputation mechanisms have been gaining momentum.
The ACM SAC 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 and 2014 TRECK tracks
attracted more than 280 researchers from both academia and industry who have
joined an online group at

The goal of the ACM SAC 2015 TRECK track remains to review the set of
applications that benefit from the use of computational trust and online
reputation. Computational trust has been used in reputation systems, risk
management, collaborative filtering, social/business networking services,
dynamic coalitions, virtual organisations and even combined with trusted
computing hardware modules. The TRECK track covers all computational
trust/reputation applications, especially those used in real-world applications.

We would like to emphasize that we may accept the submission of industrial experience reports,
commercial tools case studies and reports of innovative computing applications if they are written in a scientific way.

This year, we have a special focus on Bring Your Own Device (BYOD) and corporate security, trust, risk and privacy
so those kinds of contributions are especially welcome!

The FP7 MUSES project investigates BYOD and corporate security, trust, risk and privacy and sponsors the ACM SAC'15 TRECK track,
more information on MUSES (Multiplatform Usable Endpoint Security) can be found here:

The topics of interest include, but are not limited to:
Trust management, reputation management and identity management
Recommender and reputation systems
Online reputation and e-réputation
Pervasive computational trust and use of context-awareness
Mobile trust, context-aware trust
Web 2.0 reputation and trust
Trust-based collaborative applications
Automated collaboration and trust negotiation
Trade-off between privacy and trust
BYOD and corporate security, trust, risk and privacy
Trust and risk-based security frameworks
Combined computational trust and trusted computing
Tangible guarantees given by formal models of trust and risk
Trust metrics assessment and threat analysis
Trust in peer-to-peer and open source systems
Technical trust evaluation and certification
Trust self-organisation
Impacts of social networks on computational trust
Evidence gathering and management
Real-world applications, running prototypes and advanced simulations
Applicability in large-scale, open and decentralised environments
Legal and economic aspects related to the use of trust and reputation engines
User-studies and user interfaces of computational trust and online reputation applications

Submission guidelines are posted on the TRECK 2015 Web site
( ), which always contains the latest updates.

September 12, 2014: Paper submission
November 17, 2014: Author notification
December 8, 2014: Camera-ready copy
April 13-17, 2015: ACM SAC in Salamanca, Spain

Track Chair:
Jean-Marc Seigneur, University of Geneva, Switzerland

Track Program Committee (TBC):
Sheikh Mahbub Habib, Technical University Darmstadt, Germany
Yung Shin Van Der Sype, ICRI-KU Leuven, Belgium
Christina Hochleitner, CURE - Center for Usability Research and Engineering, Austria
Carmen Fernandez-Gago, University of Malaga, Spain
Uwe Roth, CRP Henri Tudor - SANTEC, Luxembourg
Ricardo Neisse, European Commission Joint Research Center, Belgium
Christian Damsgaard Jensen, Technical University of Denmark
Fabio Martinelli, CNR, Italy
Yanjun Zuo, University of North Dakota, USA
Joerg Abendroth, Nokia Siemens Networks, Germany
Paolo Massa, Fondazione Bruno Kessler, Italy
Stephen Marsh, University of Ontario Institue of IT, Canada
Rafael Timoteo De Sousa Junior, University of Brasilia, Brazil
Ali Chehab, American University of Beirut, Lebanon
Sini Ruohomaa, University of Helsinki, Finland
Ronald Petrlic, University of Paderborn, Germany
Anirban Basu, KDDI R&D Laboratories, Japan

Related Resources

TRECK 2017   ACM SAC Trust Reputation TRECK Track 2017
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
SAC PL 2017   ACM SAC'17 PL Track
IJMSA 2016   International Journal of Modelling, Simulation and Applications
SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
SeMoCloud 2017   The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Cloud
UbiComp 2017   2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing
INTRICATE-SEC 2017   5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services (INTRICATE-SEC 2017)