posted by user: ashu_nanda || 23405 views || tracked by 48 users: [display]

TrustCom 2017 : 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications


When Aug 1, 2017 - Aug 4, 2017
Where Sydney, Australia
Submission Deadline Mar 1, 2017
Notification Due May 1, 2017
Final Version Due Jun 1, 2017
Categories    trust   security   privacy   forensics

Call For Papers

The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17) will be held in Sydney, Australia from 1st to 4th August, 2017. The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

Topics of interest include, but are not limited to:

Trust Track
-Trust semantics, metrics and models
-Trusted computing platform
-Trusted network computing
-Trusted operating systems
-Trusted software and applications
-Trust in social networks
-Trust in e-commerce and e-government
-Trust in mobile and wireless communications
-Risk and reputation management
-Survivable computer systems/networks
-Trust in 5G networks
-Miscellaneous trust issues in cyber Security

Security Track
-Network and Cyber security
-Computer security
-Database security
-Web applications security
-Security policy, model and architecture
-Security in social networks
-Security in parallel and distributed systems
-Security in mobile and wireless communications
-Security in cloud/pervasive computing
-Authentication, authorization and accounting
-Security of 5G Networks
-Miscellaneous security issues

Privacy Track
-Privacy in Web-based applications and services
-Privacy in database systems
-Privacy in parallel and distributed systems
-Privacy in cloud/pervasive computing
-Privacy in mobile and wireless communications
-Privacy in e-commerce and e-government
-Privacy in network deployment and management
-Privacy and trust
-Privacy and security
-Privacy and anonymity
-Privacy preservation in 5G
-Miscellaneous privacy issues

Forensics and Analytics Track
-Cyber Analytics
-Big data forensics
-CCTV forensics
-Cloud forensics
-Computational forensics
-Cyber-physical system forensics
-Datamining for forensics
-Facial recognition
-Fingerprint forensics
-Image forensics
-Malware forensics
-Mobile app forensics (e.g. Skype, WeChat and Facebook)
-Mobile device forensics
-Multimedia forensics
-Network forensics
-Steganography and steganalysis
-System reverse engineering

Submission Guidelines
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings Format with Portable Document Format (.pdf). The Submission link will be updated soon

Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Accepted and presented papers will be included in the IEEE CPS Proceedings. Distinguished papers presented at the conference, after further revision, will be recommended to high quality international journals.

Important Dates

Submission deadline: 1st March 2017
Authors notification: 1st May 2017
Camera-ready due: 1st June 2017
Registration: 1st June 2017

Organization Committee

General Chairs
-Xiangjian He, University of Technology Sydney, Australia
-Prasant Mohapatra, University of California, Davis, USA
-Ravi Sandhu, University of Texas at San Antonio, USA

Program Chairs
-Priyadarsi Nanda, University of Technology Sydney, Australia
-Yang Xiang, Deakin University, Melbourne, Australia
-Yi Mu, University of Wollongong, Australia

Track Chair
Trust Track Chairs
-Surya Nepal, Data 61, Australia
Security Track Chairs
-Vijay Laxmi, Malaviya National Institute of Technology, Jaipur, India
Privacy Track Chairs
-Gabi Dreo Rodosek, Universit√§t der Bundeswehr M√ľnchen, Germany
Forensics Track Chairs
-Raymond Chu, University of Texas at San Antonio, USA

Steering Committee
Steering Co-Chairs
-Guojun Wang, Central South University, China
-Laurence T. Yang, St. Francis Xavier University, Canada

Publicity Chairs
-Yan Wang, Macquarie University, Australia
-Manoj S Gaur, Malaviya National Institute of Technology, Jaipur, India
-Isabelle Chrisment, Loria, INRIA, France

Workshop and Tutorial Chairs
-Doan Hoang, University of Technology Sydney, Australia
-Ryan Ko, University of Waikato, New Zealand

Finance Chair
-Wenjing Jia, University of Technology Sydney, Australia

Web Chair
-Ashish Nanda, University of Technology Sydney, Australia

Related Resources

EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
doors 2023   3rd Edge Computing Workshop
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
ACNS 2023   21st International Conference on Applied Cryptography and Network Security
ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
CCAI 2023   IEEE--2023 3rd International Conference on Computer Communication and Artificial Intelligence (CCAI 2023)
IoT special issue 2022   Call for papers on the Special Issue titled Sustainability Privacy-Preserving of IoT-Based Application in Smart Healthcare