[Tccc] CFP: 2013 International Workshop on Trust, Security and Privacy for Big Data (TrustData-13)-submission deadline has been extended to July 10

刘伟荣 fratatcsu.edu.cn
Tue Jun 25 12:49:25 EDT 2013



 Apologies if you received multiple copies of this TrustData-13 CFPs with 8 SCI 
& EI Indexed Journal Special Issues Shared by CSS 2013 & its 
Symposiums/Workshops (Extended Paper Submission Deadline: July 10, 2013).  

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Call for Papers for the 2013 International Workshop on Trust, Security and 
Privacy
for Big Data (TrustData-13)

Venue & Dates: Zhangjiajie, China, November 13-15, 2013
http://trust.csu.edu.cn/conference/TrustData2013

In Conjunction with 

The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)
http://trust.csu.edu.cn/conference/CSS2013


---------------------------------------
Highlight 1: 
------------

Introduction to Zhangjiajie, China, an emerging tourist destination:
http://trust.csu.edu.cn/conference/zhangjiajietour2013/


Highlight 2: 
------------

You are welcome to attend all the 8 keynote speeches shared by co-located IEEE 
HPCC 2013 / IEEE/IFIP EUC 2013 / CSS 2013 
conferences/symposiums/workshops as below:

------------
Keynote Speaker 1: Dr. Ivan Stojmenovic
Professor at the University of Ottawa, Canada

Title: IoT/CPS: M2M Communication, Actuation and Coordination Challenges

------------
Keynote Speaker 2: Dr. Albert Y. Zomaya
Chair Professor at the University of Sydney, Australia

Title: Adaptable Resource Management in Clouds

------------
Keynote Speaker 3: Dr. Jianer Chen
Professor at Department of Computer Science, Texas A&M University, USA

Title: Transparent Computing: Theoretical Challenges

------------
Keynote Speaker 4: Dr. Yi Pan
Distinguished University Professor and Chair, Department of Computer Science, 
Georgia State University, USA

Title: Cloud Computing Programming Models - Challenges and Solutions

------------
Keynote Speaker 5: Dr. Han-Chieh Chao
President & Professor at National Ilan University, I-Lan, Taiwan

Title: Quantum Cryptography and Network Applications

------------
Keynote Speaker 6: Dr. Hai Jin
Dean & Professor at School of Computer Science and Technology, Huazhong 
University of Science and Technology, China

Title: Cloud Security: Challenges and Practice

------------
Keynote Speaker 7: Dr. Minyi Guo
Head & Professor at Department of Computer Science & Engineering, Shanghai Jiao 
Tong University, China

Title: TBD

------------
Keynote Speaker 8: Dr. Huadong Ma
Dean & Professor at School of Computer Science, Beijing University of Posts and 
Telecommunications, China

Title: TBD


------------
Highlight 3: 
------------

Distinguished papers, after further revisions, will be published in the 
following SCI & EI indexed journal special issues:

(1) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 2.833)
http://www.journals.elsevier.com/information-sciences/

(2) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact 
Factor: 1.978)
http://www.journals.elsevier.com/future-generation-computer-systems/

(3) IEEE Systems Journal (SCI&EI Indexed, Impact Factor: 0.923)
http://ieeesystemsjournal.org/

(4) Computers & Security - Elsevier (SCI&EI Indexed, Impact Factor: 0.868)
http://ees.elsevier.com/cose/

(5) International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) - 
INDERSCIENCE (SCI&EI Indexed, Impact Factor: 0.848)
http://www.inderscience.com/jhome.php?jcode=IJAHUC

(6) Security and Communication Networks - Wiley (SCI&EI Indexed, Impact Factor: 
0.414)
http://www.interscience.wiley.com/security

(7) *International Journal of Computational Science and Engineering (IJCSE) - 
INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJCSE

(8) *International Journal of Autonomous and Adaptive Communications Systems 
(IJAACS) - INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJAACS

*Selected papers from this conference will be published directly in those 
journal special issues (they will NOT appear in the conference proceedings).
-------------------------------------------------------------------------------------------------------------



Introduction

The proliferation of new technologies such as Internet of Things and cloud 
computing 
calls for innovative ideas to retrieve, filter, and integrate data from a large 
number 
of diverse data sources. Big Data is an emerging paradigm applied to datasets 
whose 
volume/velocity/variability is beyond the ability of commonly used software 
tools to 
manage and process the data within a tolerable period of time. More 
importantly, Big 
Data has to be of high value, and should be protected in an efficient way. 
Since Big 
Data involves a huge amount of data that is of high-dimensionality and 
inter-linkage, 
existing trust, security, and privacy measures for traditional databases and 
infrastructures cannot satisfy its requirements. Novel technologies for 
protecting Big 
Data are attracting researchers and practitioners with more and more attention.


Scope and Interests

The 2013 International Workshop on Trust, Security and Privacy for Big Data 
(TrustData-13)
aims to bring together people from both academia and industry to present their 
most 
recent work related to trust, security and privacy issues in Big Data, and 
exchange 
ideas and thoughts in order to identify emerging research topics and define the 
future of 
Big Data. Topics of interest include, but are not limited to:


Trust Track
(1) Trust semantics, metrics, and models for Big Data
(2) Trust management and evaluation for Big Data
(3) Trusted systems, software, and applications for Big Data
(4) Trusted platform implementation technologies for Big Data
(5) Information quality/trustworthiness for Big Data
(6) Provenance of content for Big Data
(7) Trustworthiness of ratings/recommender systems for Big Data

Security Track
(1) Security model and architecture for Big Data
(2) Data mining security for Big Data
(3) Software and system security for Big Data
(4) Intrusion detection for Gigabit Networks
(5) Cryptography and Big Data
(6) Visualizing large scale security data
(7) Threat detection using Big Data analytics
(8) Human computer interaction challenges for Big Data security
(9) Data protection, integrity standards and policies
(10) Security and legislative impacts for Big Data
(11) Managing user access for Big Data

Privacy Track
(1) Privacy in Big Data applications and services
(2) Privacy in Big Data end-point input validation and filtering
(3) Privacy in Big Data integration and transformation
(4) Privacy in parallel and distributed computation
(5) Privacy in Big Data storage management
(6) Privacy in Big Data access control mechanisms
(7) Privacy in Big Data mining and analytics
(8) Privacy in Big Data sharing and visualization
(9) Big Data privacy policies and standards


Submission and Publication Information

The accepted papers from this workshop will be published by Springer Lecture 
Notes in 
Computer Science (EI Compendex indexed). Submitted papers must not 
substantially overlap with 
papers that have been published or that are simultaneously submitted to a 
journal or a 
conference with proceedings. Papers must be clearly presented in English, must 
not 
exceed 10 pages (or 14 pages with the over length charge), including tables, 
figures, 
references and appendixes, in Springer LNCS Format with Portable Document 
Format (.pdf). 
Please submit your paper at 
https://www.easychair.org/conferences/?conf=trustdata2013.

Papers will be selected based on their originality, timeliness, significance, 
relevance, 
and clarity of presentation. Distinguished papers, after further revisions, 
will be 
considered for possible publication in several SCI & EI indexed special issues 
of prestigious 
international journals. By submitting a paper to the workshop, authors assure 
that if the paper 
is accepted, at least one author will attend the workshop and present the 
paper. 
For no-show authors, their papers will be removed from the digital library 
after the workshop 
and their affiliations will be notified.


Important Dates

(1) Paper Submission Deadline:      July 10, 2013 (Extended Deadline)
(2) Authors Notification:           August 15, 2013
(3) Camera-Ready Paper Due:         September 15, 2013   
(4) Conference Dates:               November 13-15, 2013  


General Co-Chairs

Guojun Wang, Central South University, China
Jin-Hee Cho, U.S. Army Research Laboratory, USA
Lizhe Wang, Chinese Academy of Sciences, China


Program Co-Chairs

Qin Liu, Central South University, China
Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria
Yongming Xie, Guangzhou University, China


Program Committee (In alphabetical order)
http://trust.csu.edu.cn/conference/TrustData2013
 

Publicity Co-Chairs

Zheng Yan, Xidian University, China/Aalto University, Finland
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Weirong Liu, Central South University, China


Webmaster

Jie Wang, Central South University, China

 
Contact

Please email inquiries concerning TrustData 2013 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com 
and the symposium organizers: trustdata2013 AT gmail DOT com

Copyright @ Trusted Computing Institute, CSU
http://trust.csu.edu.cn/
-----------------------------------------------------------------------------------
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
 




More information about the TCCC mailing list