TrustCom 2008

Call for Papers for The 2008 International
Symposium on Trusted Computing (TrustCom 2008)

Organizer: Trusted Computing Institute, Central South University, China
Zhang Jia Jie, China, November 18-20, 2008
http://trust.csu.edu.cn/conference/trustcom2008
To be held in conjunction with The 9th International
Conference for Young Computer Scientists (ICYCS 2008)
http://www.csu.edu.cn/ICYCS2008
In cooperation with the IEEE Computer Society
http://www.computer.org

Introduction:
The 2008 International Symposium on Trusted Computing (TrustCom 2008), to be
held in conjunction with the 9th International Conference for Young Computer
Scientists (ICYCS 2008), aims at bringing together researchers and
practitioners in the world working on trusted computing with regard to
security, safety, privacy, reliability, dependability, survivability,
availability, and fault tolerance aspects of computer systems and networks,
and providing a forum for them to present and discuss emerging ideas and
trends in this highly challenging research field.

Scope and Interests:
TrustCom 2008 is an international forum for presenting and discussing
emerging ideas and trends in trusted computing in computer systems and
networks from both the research community as well as the industry. Topics of
interest include, but are not limited to:
(1) Semantics, metrics and models of trust
(2) Trust establishment, propagation, and management
(3) Trusted computing platform
(4) Trusted network computing
(5) Trusted operating system
(6) Trusted software
(7) Trusted database
(8) Trusted services and applications
(9) Trust in e-commerce and e-government
(10) Trust in mobile and wireless networks
(11) Cryptography and security protocols
(12) Reliable and fault-tolerant computer systems/networks
(13) Survivable computer systems/networks
(14) Authentication in computer systems/networks
(15) Access control in computer systems/networks
(16) Key management in computer systems/networks


Submission and Publication Information:
The symposium proceedings will be published by the IEEE Computer Society
(will be indexed by EI Compendex & ISTP). Manuscripts should be written in
English conforming to the IEEE standard conference format (8.5" x 11",
Two-Column) [http://www.computer.org/portal/pages/cscps/cps/cps_forms.html].
Manuscripts should be submitted through the paper submission system at the
symposium website
[http://trust.csu.edu.cn/conference/trustcom2008/submission]. Each accepted
paper is limited to 6 pages (or 8 pages with over length charge).
Distinguished papers, after further revisions, will be published in a
special issue of Wiley journal: Security and Communication Networks
(http://www.interscience.wiley.com/security). The program committee will
select one winner for the Best Paper Award for the symposium. Submission of
a paper should be regarded as a commitment such that, if accepted, at least
one author of the paper will register and attend the symposium; otherwise,
it will be removed from the IEEE Digital Library after the symposium.

Important Dates:
(1) Paper submission due: June 15, 2008
(2) Notification of decision: July 15, 2008
(3) Camera-ready papers due: August 1, 2008

General Co-Chairs:
Weijia Jia, City University of Hong Kong, Hong Kong Kouichi Sakurai, Kyushu
University, Japan Hsiao-Hwa Chen, National Cheng Kung University, Taiwan

Program Co-Chairs:
Guojun Wang, Central South University, China Chang-Ai Sun, Beijing Jiao Tong
University, China Bin Xiao, Hong Kong Polytechnic University, Hong Kong

Steering Co-Chairs:
Laurence T. Yang, St. Francis Xavier University, Canada Minyi Guo, Shanghai
Jiao Tong University, China Jiannong Cao, Hong Kong Polytechnic University,
Hong Kong

Publicity Co-Chairs:
Yan Zhang, Simula Research Laboratory, Norway Baoliu Ye, Nanjing University,
China Peter Mueller, IBM Zurich Research Laboratory, Switzerland

Secretariat:
Yueming Deng, Central South University, China

Program Committee: (in alphabetical order) Adel Cherif, Qatar University,
Qatar Carlos Baladron, University of Valladolid, Spain Dafang Zhang, Hunan
University, China Dengguo Feng, Institute of Software, Chinese Academy of
Sciences, China Deqing Zou, Huazhong University of Science & Technology,
China Dong Xiang, Tsinghua University, China Dongyang Long, Sun Yat-Sen
University, China Emmanuelle Anceaume, IRISA, France Fang Qi, Central South
University, China Feng Bao, Institute for Infocomm Research, Singapore Gang
Li, Institute of Computing Technology, Chinese Academy of Sciences, China
Geyong Min, University of Bradford, UK Gianluca Ramunno, Politecnico di
Torino, Italy Gregorio Martinez, University of Murcia (UMU), Spain Helen
Yiqun Tang, Defence Research & Development Canada ¨C Ottawa, Canada
Jean-Marc Seigneur, University of Geneva, Switzerland Ji Wu, Beihang
University, China Jian Yu, Politecnico di Torino, Italy Jianhua Ma, Hosei
University, Japan Jie Li, University of Tsukuba, Japan Jie Wu, National
Science Foundation, USA Jinhua Xiong, Institute of Computing Technology,
Chinese Academy of Sciences, China Jinzhao Wu, Beijing Jiaotong University,
China Jun Shen, University of Wollongong, Australia Kai-Yuan Cai, Beihang
University, China Kenji Saito, Keio University, Japan Keqiu Li, Dalian
University of Technology, China Liudong Xing, University of Massachusetts
Dartmouth, USA Marco Aiello, University of Groningen, the Netherlands Maria
S. Perez-Hernandez, Universidad Politecnica de Madrid, Madrid, Spain Marten
J. Van Sinderen, Universty of Twente, the Netherlands Masumi Toyoshima,
Kitakyushu University, Japan Mieso Denko, University of Guelph, Canada Paolo
Falcarin, Politecnico di Torino, Italy Sanglu Lu, Nanjing University, China
Sy-Yen Kuo, National Taiwan University, Taiwan Tai Xin, Microsoft
Corporation, USA Weiping Wang, Central South University, China Wenbin Jiang,
Huazhong Univ. of Science and Technology, China Wing-Kwong Chan, City
University of Hong Kong, Hong Kong Xiaolin (Andy) Li, Oklahoma State
University, USA Xiaoying Bai, Tsinghua University, China Yanbo Han,
Institute of Computing Technology, Chinese Academy of Sciences, China Yi Mu,
University of Wollongong, Australia Young-Sik Jeong, WonKwang University,
Korea Yuzhong Sun, Institute of Computing Technology, Chinese Academy of
Sciences, China Zhiguang Qin, University of Electronic Science and
Technology of China, China Zhi Quan Zhou, University of Wollongong,
Australia Zili Shao, Hong Kong Polytechnic University, Hong Kong

Contact:
Please email inquiries concerning TrustCom 2008 to: Prof. Guojun Wang
Email: csgjwang AT mail.csu.edu.cn; csgjwang AT gmail.com
Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/

No comments: