[Tccc] Final CFPs for the 2013 International Workshop on Trust, Security and Privacy for Big Data (TrustData-13)(Extended Paper Submission Deadline: July 20, 2013, FIRM DEADLINE).
åä¼è£
fratatcsu.edu.cn
Sun Jul 14 01:59:57 EDT 2013
Apologies if you received multiple copies of this TrustData-13 Final CFPs with
8 SCI & EI Indexed Journal Special Issues Shared by CSS 2013 & its
Symposiums/Workshops (Extended Paper Submission Deadline: July 20, 2013, FIRM
DEADLINE).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Final Call for Papers for the 2013 International Workshop on Trust, Security
and Privacy
for Big Data (TrustData-13)
Venue & Dates: Zhangjiajie, China, November 13-15, 2013
http://trust.csu.edu.cn/conference/TrustData2013
In Conjunction with
The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)
http://trust.csu.edu.cn/conference/CSS2013
---------------------------------------
Highlight 1:
------------
Introduction to Zhangjiajie, China, an emerging tourist destination:
http://trust.csu.edu.cn/conference/zhangjiajietour2013/
Highlight 2:
------------
You are welcome to attend all the 8 keynote speeches shared by co-located IEEE
HPCC 2013 / IEEE/IFIP EUC 2013 / CSS 2013
conferences/symposiums/workshops as below:
------------
Keynote Speaker 1: Dr. Ivan Stojmenovic
Professor at the University of Ottawa, Canada
Title: IoT/CPS: M2M Communication, Actuation and Coordination Challenges
------------
Keynote Speaker 2: Dr. Albert Y. Zomaya
Chair Professor at the University of Sydney, Australia
Title: Adaptable Resource Management in Clouds
------------
Keynote Speaker 3: Dr. Jianer Chen
Professor at Department of Computer Science, Texas A&M University, USA
Title: Transparent Computing: Theoretical Challenges
------------
Keynote Speaker 4: Dr. Yi Pan
Distinguished University Professor and Chair, Department of Computer Science,
Georgia State University, USA
Title: Cloud Computing Programming Models - Challenges and Solutions
------------
Keynote Speaker 5: Dr. Han-Chieh Chao
President & Professor at National Ilan University, I-Lan, Taiwan
Title: Quantum Cryptography and Network Applications
------------
Keynote Speaker 6: Dr. Hai Jin
Dean & Professor at School of Computer Science and Technology, Huazhong
University of Science and Technology, China
Title: Cloud Security: Challenges and Practice
------------
Keynote Speaker 7: Dr. Minyi Guo
Head & Professor at Department of Computer Science & Engineering, Shanghai Jiao
Tong University, China
Title: Data Center Architecture and OS for Massively Data-Intensive Computing
------------
Keynote Speaker 8: Dr. Huadong Ma
Dean & Professor at School of Computer Science, Beijing University of Posts and
Telecommunications, China
Title: Some Research Challenges and Progresses in the Architecture of IoT
------------
Highlight 3:
------------
Distinguished papers, after further revisions, will be published in the
following SCI & EI indexed journal special issues:
(1) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 2.833)
http://www.journals.elsevier.com/information-sciences/
(2) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact
Factor: 1.978)
http://www.journals.elsevier.com/future-generation-computer-systems/
(3) IEEE Systems Journal (SCI&EI Indexed, Impact Factor: 0.923)
http://ieeesystemsjournal.org/
(4) Computers & Security - Elsevier (SCI&EI Indexed, Impact Factor: 0.868)
http://ees.elsevier.com/cose/
(5) International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) -
INDERSCIENCE (SCI&EI Indexed, Impact Factor: 0.848)
http://www.inderscience.com/jhome.php?jcode=IJAHUC
(6) Security and Communication Networks - Wiley (SCI&EI Indexed, Impact Factor:
0.414)
http://www.interscience.wiley.com/security
(7) *International Journal of Computational Science and Engineering (IJCSE) -
INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJCSE
(8) *International Journal of Autonomous and Adaptive Communications Systems
(IJAACS) - INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJAACS
*Selected papers from this conference will be published directly in those
journal special issues (they will NOT appear in the conference proceedings).
-------------------------------------------------------------------------------------------------------------
Introduction
The proliferation of new technologies such as Internet of Things and cloud
computing
calls for innovative ideas to retrieve, filter, and integrate data from a large
number
of diverse data sources. Big Data is an emerging paradigm applied to datasets
whose
volume/velocity/variability is beyond the ability of commonly used software
tools to
manage and process the data within a tolerable period of time. More
importantly, Big
Data has to be of high value, and should be protected in an efficient way.
Since Big
Data involves a huge amount of data that is of high-dimensionality and
inter-linkage,
existing trust, security, and privacy measures for traditional databases and
infrastructures cannot satisfy its requirements. Novel technologies for
protecting Big
Data are attracting researchers and practitioners with more and more attention.
Scope and Interests
The 2013 International Workshop on Trust, Security and Privacy for Big Data
(TrustData-13)
aims to bring together people from both academia and industry to present their
most
recent work related to trust, security and privacy issues in Big Data, and
exchange
ideas and thoughts in order to identify emerging research topics and define the
future of
Big Data. Topics of interest include, but are not limited to:
Trust Track
(1) Trust semantics, metrics, and models for Big Data
(2) Trust management and evaluation for Big Data
(3) Trusted systems, software, and applications for Big Data
(4) Trusted platform implementation technologies for Big Data
(5) Information quality/trustworthiness for Big Data
(6) Provenance of content for Big Data
(7) Trustworthiness of ratings/recommender systems for Big Data
Security Track
(1) Security model and architecture for Big Data
(2) Data mining security for Big Data
(3) Software and system security for Big Data
(4) Intrusion detection for Gigabit Networks
(5) Cryptography and Big Data
(6) Visualizing large scale security data
(7) Threat detection using Big Data analytics
(8) Human computer interaction challenges for Big Data security
(9) Data protection, integrity standards and policies
(10) Security and legislative impacts for Big Data
(11) Managing user access for Big Data
Privacy Track
(1) Privacy in Big Data applications and services
(2) Privacy in Big Data end-point input validation and filtering
(3) Privacy in Big Data integration and transformation
(4) Privacy in parallel and distributed computation
(5) Privacy in Big Data storage management
(6) Privacy in Big Data access control mechanisms
(7) Privacy in Big Data mining and analytics
(8) Privacy in Big Data sharing and visualization
(9) Big Data privacy policies and standards
Submission and Publication Information
The accepted papers from this workshop will be published by Springer Lecture
Notes in
Computer Science (EI Compendex indexed). Submitted papers must not
substantially overlap with
papers that have been published or that are simultaneously submitted to a
journal or a
conference with proceedings. Papers must be clearly presented in English, must
not
exceed 10 pages (or 14 pages with the over length charge), including tables,
figures,
references and appendixes, in Springer LNCS Format with Portable Document
Format (.pdf).
Please submit your paper at
https://www.easychair.org/conferences/?conf=trustdata2013.
Papers will be selected based on their originality, timeliness, significance,
relevance,
and clarity of presentation. Distinguished papers, after further revisions,
will be
considered for possible publication in several SCI & EI indexed special issues
of prestigious
international journals. By submitting a paper to the workshop, authors assure
that if the paper
is accepted, at least one author will attend the workshop and present the
paper.
For no-show authors, their papers will be removed from the digital library
after the workshop
and their affiliations will be notified.
Important Dates
(1) Paper Submission Deadline: July 20, 2013 (Extended Firm Deadline)
(2) Authors Notification: August 20, 2013
(3) Camera-Ready Paper Due: September 15, 2013
(4) Conference Dates: November 13-15, 2013
General Co-Chairs
Guojun Wang, Central South University, China
Jin-Hee Cho, U.S. Army Research Laboratory, USA
Lizhe Wang, Chinese Academy of Sciences, China
Program Co-Chairs
Qin Liu, Central South University, China
Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria
Yongming Xie, Guangzhou University, China
Program Committee (In alphabetical order)
http://trust.csu.edu.cn/conference/TrustData2013
Publicity Co-Chairs
Zheng Yan, Xidian University, China/Aalto University, Finland
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Weirong Liu, Central South University, China
Webmaster
Jie Wang, Central South University, China
Contact
Please email inquiries concerning TrustData 2013 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the symposium organizers: trustdata2013 AT gmail DOT com
Copyright @ Trusted Computing Institute, CSU
http://trust.csu.edu.cn/
-----------------------------------------------------------------------------------
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
More information about the Tccc
mailing list