The 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010)

Organizer: Trusted Computing Institute, Central South University, China

Venue & Dates: Hong Kong SAR, China, December 11-13, 2010

http://trust.csu.edu.cn/conference/trustcom2010

To be held in conjunction with

The Eighth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-10)

http://www.euc2010.org/

Introduction

With the rapid development and the increasing complexity of computer and communications systems and networks, traditional security technologies and measures can not meet the demand for integrated and dynamic security solutions. As a challenging and innovative research field, trusted computing and communications target computer and communications systems and networks that are available, secure, reliable, controllable, dependable, and so on. In a word, they must be trustworthy. If we view the traditional security as identity trust, the broader field of trusted computing and communications also includes behavior trust of systems and networks. In fact, trusted computing and communications have become essential components of various distributed services, applications, and systems, including ad-hoc networks, peer-to-peer networks, social networks, semantic webs, e-commence, e-government, pervasive, ubiquitous, and cyber-physical systems.

The Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10) will be held in conjunction with “The Eighth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-10)”. It follows the success of TrustCom-09 in Vancouver, Canada, TrustCom-08 in Zhangjiajie, China, SNDS-07 in Niagara Falls, Canada, SNDS-06 in Vienna, Austria, and SNDS-05 in Fukuoka, Japan. It aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to security, safety, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

Scope and Interests

TrustCom-10 is an international forum for presenting and discussing emerging ideas and trends in trusted computing and communications in computer systems and networks from both the research community as well as the industry. Topics of interest include, but are not limited to:

  • Trust semantics, metrics, and models
  • Trust inference, computation, and combination
  • Trusted computing platform
  • Trusted network computing
  • Trusted operating systems
  • Trusted software
  • Trusted database
  • Trusted services and applications
  • Trusted communications
  • Trust in e-commerce and e-government
  • Trust in mobile and wireless networks
  • Reliable and fault-tolerant computer systems/networks
  • Survivable computer systems/networks
  • Cryptography and security protocols
  • Authentication in computer systems/networks
  • Access control in computer systems/networks
  • Key management in computer systems/networks
  • Anonymity and privacy in computer systems/networks
  • Trust in emerging applications
  • Miscellaneous trust issues

Submission and Publication Information

The accepted papers from this symposium will be published by IEEE Computer Society in IEEE EUC-10 proceedings (indexed by EI Compendex and ISTP). Papers should be written in English conforming to the IEEE standard conference format(8.5″ x 11″, Two-Column). Papers should be submitted through the paper submission system at the symposium website. Manuscripts should be submitted through the paper submission system at the symposium website. Each paper is limited to 6 pages (or 8 pages with the over length charge). Distinguished papers, after further revisions, will be published in two special issues: (1) Elsevier’s Computer and Communications (COMCOM); (2) IEICE’s Transactions on Information and Systems, both to be indexed by SCI and EI. The program committee will select one winner for the Best Paper Award for this symposium. Submitting a paper to the symposium means that, if the paper is accepted, at least one author should attend the symposium and present the paper. For no-show authors, their papers will be removed from the digital library after the symposium and their affiliations will be notified.

Past Special Issues

  • TrustCom 2009 SI: Elsevier’s Journal of Network and Computer Applications (JNCA), both SCI and EI indexed.
  • TrustCom 2008 SI: Wiley’s Security and Communication Networks (SCN), both SCI and EI indexed.

Important Dates

Paper submission due 31 July, 2010 (Firm Deadline)
Notification of decision September 20, 2010
Camera-ready papers due October 22, 2010

Organization Committee

General Co-Chairs

  • Jie Wu, Temple University, USA
  • Srinivas Sampalli, Dalhousie University, Canada

Program Co-Chairs

  • Helen Y. Tang, Defence Research & Development Canada–Ottawa, Canada
  • Xinwen Fu, University of Massachusetts Lowell, USA

Steering Committee

  • Guojun Wang, Central South University, China (Chair)
  • Laurence T. Yang, St. Francis Xavier University, Canada (Chair)
  • Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
  • Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
  • Jie Wu, Temple University, USA
  • Kouichi Sakurai, Kyushu University, Japan
  • Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
  • Minyi Guo, Shanghai Jiao Tong University, China
  • Peter Mueller, IBM Zurich Research Laboratory, Switzerland
  • Weijia Jia, City University of Hong Kong, Hong Kong

Publicity Co-Chairs

  • Alberto Sanchez, Universidad Rey Juan Carlos, Madrid, Spain
  • Guang Gong, University of Waterloo, Canada
  • Hamid Mehrvar, Nortel, Canada
  • Hejun Wu, Sun Yat-Sen University, China
  • Matthew Wright, University of Texas at Arlington, USA
  • Shuhui Yang, Purdue University Calumet, USA

Secretariat

  • Feng Yan, Central South University, China

Webmaster

  • Qiushuang Du, Central South University, China

Contact