+ADwAIQ-DOCTYPE HTML PUBLIC +ACI--//W3C//DTD HTML 4.01 Transitional//EN+ACIAPg-
+ADw-HTML+AD4-
+ADw-HEAD+AD4-
+ADw-TITLE+AD4- +AFs-Tccc+AF0- Call For Book Chapters: Managing Trust in Cyberspace +AFs-CRC Press+AF0-
+ADw-/TITLE+AD4-
+ADw-LINK REL+AD0AIg-Index+ACI- HREF+AD0AIg-index.html+ACI- +AD4-
+ADw-LINK REL+AD0AIg-made+ACI- HREF+AD0AIg-mailto:tccc+ACU-40?Subject+AD0-Re+ACU-3A+ACU-20+ACU-5BTccc+ACU-5D+ACU-20Call+ACU-20For+ACU-20Book+ACU-20Chapters+ACU-3A+ACU-20Managing+ACU-20Trust+ACU-20in+ACU-20Cyberspace+ACU-20+ACU-5BCRC+ACU-0A+ACU-09Press+ACU-5D+ACY-In-Reply-To+AD0AJQ-3CCACvXDQNXSyVBvPuY+ACU-3Dkvg5vrD40s908An17T+ACU-3DQ+AF8-qVX4do7pR4HA+ACU-40mail.gmail.com+ACU-3E+ACIAPg-
+ADw-META NAME+AD0AIg-robots+ACI- CONTENT+AD0AIg-index,nofollow+ACIAPg-
+ADw-style type+AD0AIg-text/css+ACIAPg-
pre +AHs-
white-space: pre-wrap+ADs- /+ACo- css-2.1, curent FF, Opera, Safari +ACo-/
+AH0-
+ADw-/style+AD4-
+ADw-META http-equiv+AD0AIg-Content-Type+ACI- content+AD0AIg-text/html+ADs- charset+AD0-us-ascii+ACIAPg-
+ADw-LINK REL+AD0AIg-Previous+ACI- HREF+AD0AIg-030828.html+ACIAPg-
+ADw-LINK REL+AD0AIg-Next+ACI- HREF+AD0AIg-030829.html+ACIAPg-
+ADw-/HEAD+AD4-
+ADw-BODY BGCOLOR+AD0AIgAj-ffffff+ACIAPg-
+ADw-H1+AD4AWw-Tccc+AF0- Call For Book Chapters: Managing Trust in Cyberspace +AFs-CRC Press+AF0APA-/H1+AD4-
+ADw-B+AD4-Sabu M Thampi+ADw-/B+AD4-
+ADw-A HREF+AD0AIg-mailto:tccc+ACU-40?Subject+AD0-Re+ACU-3A+ACU-20+ACU-5BTccc+ACU-5D+ACU-20Call+ACU-20For+ACU-20Book+ACU-20Chapters+ACU-3A+ACU-20Managing+ACU-20Trust+ACU-20in+ACU-20Cyberspace+ACU-20+ACU-5BCRC+ACU-0A+ACU-09Press+ACU-5D+ACY-In-Reply-To+AD0AJQ-3CCACvXDQNXSyVBvPuY+ACU-3Dkvg5vrD40s908An17T+ACU-3DQ+AF8-qVX4do7pR4HA+ACU-40mail.gmail.com+ACU-3E+ACI-
TITLE+AD0AIgBb-Tccc+AF0- Call For Book Chapters: Managing Trust in Cyberspace +AFs-CRC Press+AF0AIgA+-sabu.thampi
+ADw-/A+AD4APA-BR+AD4-
+ADw-I+AD4-Fri Jun 29 12:38:36 EDT 2012+ADw-/I+AD4-
+ADw-P+AD4APA-UL+AD4-
+ADw-LI+AD4-Previous message: +ADw-A HREF+AD0AIg-030828.html+ACIAPgBb-Tccc+AF0- Call for Book Chapters: Managing Trust in Cyberspace +AFs-CRC Press+AF0-
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4-Next message: +ADw-A HREF+AD0AIg-030829.html+ACIAPgBb-Tccc+AF0- 3rd ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2012) Call for Posters and Demos
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4- +ADw-B+AD4-Messages sorted by:+ADw-/B+AD4-
+ADw-a href+AD0AIg-date.html+ACM-31059+ACIAPgBb- date +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-thread.html+ACM-31059+ACIAPgBb- thread +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-subject.html+ACM-31059+ACIAPgBb- subject +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-author.html+ACM-31059+ACIAPgBb- author +AF0APA-/a+AD4-
+ADw-/LI+AD4-
+ADw-/UL+AD4-
+ADw-HR+AD4-
+ADwAIQ---beginarticle--+AD4-
+ADw-PRE+AD4- Call For Book Chapters: Managing Trust in Cyberspace
+ADw-A HREF+AD0AIg-http://www.iiitmk.ac.in/trustbook/index.html+ACIAPg-http://www.iiitmk.ac.in/trustbook/index.html+ADw-/A+AD4-
First call for book chapters
Proposals Submission Deadline: July 31, 2012
Full Chapters Due: October 30, 2012
To be published by CRC Press, Francis +ACY-amp+ADs- Taylor Group
INTRODUCTION
Traditional security mechanisms typically protect resources from malicious
users, by restricting access to only authorized users. In many situations
we have to protect ourselves from those who offer resources/services so
that the problem in fact is reversed. For example, information providers
can act deceitfully by providing false or misleading information. Malicious
or improper usages like the above attacks cannot be addressed by
traditional security solutions. These issues relate more with
trustworthiness rather than security. In distributed open systems, where
the behavior of autonomous agents is uncertain and can affect other agents'
welfare, trust management is widely used to allow agents to determine what
to expect about the behavior of other agents. Role of trust management is
to maximize trust between the parties and thereby provide a basis for
cooperation to develop.
OBJECTIVES OF THE BOOK
The objective of this book is twofold. The first aim is providing a
comprehensive overview of current literature on trust management. This will
include cross-disciplinary examination of fundamental issues underpinning
computational trust models by bringing together expertise from technology
oriented sciences, law, philosophy and social sciences. A wide discussion
on various trust management processes for dynamic open systems and
applications. Starting from this consolidated knowledge, the second aim of
the book is initiating venues for future research such as introducing new
paradigms in the area of dynamic open systems which effectively utilize
computational trust models.
TARGET AUDIENCE
The targeted audience of the book is graduate students, researchers,
academics, and industry practitioners working in the areas such as
distributed computing and Internet technologies. The book is expected to
include few chapters written in tutorial style for general readers.
RECOMMENDED TOPICS
Recommended topics include, but are not limited to, the following:
Bio-inspired, distributed/dynamic trust management
Trust self-organisation and autonomic networks
Legal/economic aspects
Pervasive computational trust, use of context-awareness
Ethics, sociology, psychology
Collaborative computing applications, critical infrastructure protection
Small-world/social networks
Security, privacy, identity management
Architecture of interoperable/open source systems
E-governance, e-learning, electronic knowledge transfer, e-commerce
Group communication systems, mobile/wireless communications, sensor networks
Trusted Software
Multimedia information management, service-oriented computing
P2P, grid, cloud and clusters
Smart grid and virtual organisations
Models, formalization, specification, analysis, reasoning
SUBMISSION PROCEDURE
This is a tutorial style book. Hence, the writing style should be concise
and accessible, avoiding jargon so that the chapter is understandable for
readers outside a specialty or those whose first language is not English.
Your manuscript must be written in English. It should be submitted as
MS-Office document. All pages must be numbered sequentially. Manuscripts
submitted for the book must be original, must not be previously published
or currently under review anywhere. Please follow A4 page format, single
column with 11 point Times New Roman font with 1.5 line spacing while
submitting your manuscript as MS-Office document. Use the number
referencing style as usually used for regular research papers, NOT the APA
style. That means, mention the reference numbers within the texts and in
the references section, mention all the references with sequential numbers+ADs-
+AFs-1+AF0-, +AFs-2+AF0-, +AFs-3+AF0-. Researchers and practitioners are invited to submit a 2-5
page manuscript proposal clearly explaining the mission and concerns of the
proposed chapter on or before July 31, 2012. Manuscripts should be
submitted by the corresponding author directly via e-mail to the
Corresponding Editor at smthampi at ieee.org.
IMPORTANT DATES
Proposal Submission Due: July 31, 2012
Full Manuscript Due: October 30, 2012
Acceptance Notification: December 15, 2012
Revised Chapter Submission: January 15, 2013
Final Acceptance Notification: February 15, 2013
Submission of Final Chapters: May 31, 2013
Publication Time: Second Half of 2013 (tentative)
EDITORS
Dr. Sabu M. Thampi (Corresponding Editor)
School of Computer Science +ACY-amp+ADs- IT
Indian Institute of Information Technology and Management - Kerala (IIITM-K)
Technopark Campus, Trivandrum-695581, Kerala, India.
Tel: 471-2700777 (Extn: 117)
Mobile:9447103005
Email: smthampi at ieee.org
Dr. Bharat Bhargava
Purdue University, Department of Computer Sciences
305 N. University Street
West Lafayette, Indiana, 47907-2107
Email: bbshail at purdue.edu
Dr. Pradeep Atrey
Department of Applied Computer Science
The University of Winnipeg, MB, R3B 2E9, CANADA
Email: p.atrey at uwinnipeg.ca
+ADw-/PRE+AD4-
+ADwAIQ---endarticle--+AD4-
+ADw-HR+AD4-
+ADw-P+AD4APA-UL+AD4-
+ADwAIQ---threads--+AD4-
+ADw-LI+AD4-Previous message: +ADw-A HREF+AD0AIg-030828.html+ACIAPgBb-Tccc+AF0- Call for Book Chapters: Managing Trust in Cyberspace +AFs-CRC Press+AF0-
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4-Next message: +ADw-A HREF+AD0AIg-030829.html+ACIAPgBb-Tccc+AF0- 3rd ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2012) Call for Posters and Demos
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4- +ADw-B+AD4-Messages sorted by:+ADw-/B+AD4-
+ADw-a href+AD0AIg-date.html+ACM-31059+ACIAPgBb- date +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-thread.html+ACM-31059+ACIAPgBb- thread +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-subject.html+ACM-31059+ACIAPgBb- subject +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-author.html+ACM-31059+ACIAPgBb- author +AF0APA-/a+AD4-
+ADw-/LI+AD4-
+ADw-/UL+AD4-
+ADw-hr+AD4-
+ADw-a href+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-More information about the TCCC
mailing list+ADw-/a+AD4APA-br+AD4-
+ADw-/body+AD4APA-/html+AD4-