[Tccc] CFP: the 2013 International Workshop on Trust, Security and Privacy for Big Data (TrustData-13)
åä¼è£
fratatcsu.edu.cn
Thu May 9 07:01:30 EDT 2013
Apologies if you received multiple copies of this TrustData-13 CFPs.
---------------------------------------------------------------------------------
Call for Papers for the 2013 International Workshop on Trust, Security and
Privacy
for Big Data (TrustData-13)
Venue & Dates: Zhangjiajie, China, November 13-15, 2013
http://trust.csu.edu.cn/conference/TrustData2013
In Conjunction with
The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)
http://trust.csu.edu.cn/conference/CSS2013
Introduction
The proliferation of new technologies such as Internet of Things and cloud
computing
calls for innovative ideas to retrieve, filter, and integrate data from a large
number
of diverse data sources. Big Data is an emerging paradigm applied to datasets
whose
volume/velocity/variability is beyond the ability of commonly used software
tools to
manage and process the data within a tolerable period of time. More
importantly, Big
Data has to be of high value, and should be protected in an efficient way.
Since Big
Data involves a huge amount of data that is of high-dimensionality and
inter-linkage,
existing trust, security, and privacy measures for traditional databases and
infrastructures cannot satisfy its requirements. Novel technologies for
protecting Big
Data are attracting researchers and practitioners with more and more attention.
Scope and Interests
The 2013 International Workshop on Trust, Security and Privacy for Big Data
(TrustData-13)
aims to bring together people from both academia and industry to present their
most
recent work related to trust, security and privacy issues in Big Data, and
exchange
ideas and thoughts in order to identify emerging research topics and define the
future of
Big Data. Topics of interest include, but are not limited to:
Trust Track
(1) Trust semantics, metrics, and models for Big Data
(2) Trust management and evaluation for Big Data
(3) Trusted systems, software, and applications for Big Data
(4) Trusted platform implementation technologies for Big Data
(5) Information quality/trustworthiness for Big Data
(6) Provenance of content for Big Data
(7) Trustworthiness of ratings/recommender systems for Big Data
Security Track
(1) Security model and architecture for Big Data
(2) Data mining security for Big Data
(3) Software and system security for Big Data
(4) Intrusion detection for Gigabit Networks
(5) Cryptography and Big Data
(6) Visualizing large scale security data
(7) Threat detection using Big Data analytics
(8) Human computer interaction challenges for Big Data security
(9) Data protection, integrity standards and policies
(10) Security and legislative impacts for Big Data
(11) Managing user access for Big Data
Privacy Track
(1) Privacy in Big Data applications and services
(2) Privacy in Big Data end-point input validation and filtering
(3) Privacy in Big Data integration and transformation
(4) Privacy in parallel and distributed computation
(5) Privacy in Big Data storage management
(6) Privacy in Big Data access control mechanisms
(7) Privacy in Big Data mining and analytics
(8) Privacy in Big Data sharing and visualization
(9) Big Data privacy policies and standards
Submission and Publication Information
The accepted papers from this workshop will be published by Springer Lecture
Notes in
Computer Science (EI indexed). Submitted papers must not substantially overlap
with
papers that have been published or that are simultaneously submitted to a
journal or a
conference with proceedings. Papers must be clearly presented in English, must
not
exceed 10 pages (or 14 pages with the over length charge), including tables,
figures,
references and appendixes, in Springer LNCS Format with Portable Document
Format (.pdf).
Please submit your paper at
https://www.easychair.org/conferences/?conf=trustdata2013.
Papers will be selected based on their originality, timeliness, significance,
relevance,
and clarity of presentation. Distinguished papers, after further revisions,
will be
considered for possible publication in several SCI & EI indexed special issues
of prestigious
international journals. By submitting a paper to the workshop, authors assure
that if the paper
is accepted, at least one author will attend the workshop and present the
paper.
For no-show authors, their papers will be removed from the digital library
after the workshop
and their affiliations will be notified.
Important Dates
(1) Paper Submission Deadline: June 15, 2013
(2) Authors Notification: August 15, 2013
(3) Camera-Ready Paper Due: September 15, 2013
(4) Conference Dates: November 13-15, 2013
General Co-Chairs
Guojun Wang, Central South University, China
Jin-Hee Cho, U.S. Army Research Laboratory, USA
Lizhe Wang, Chinese Academy of Sciences, China
Program Co-Chairs
Qin Liu, Central South University, China
Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria
Yongming Xie, Guangzhou University, China
Program Committee (In alphabetical order)
http://trust.csu.edu.cn/conference/TrustData2013
Publicity Co-Chairs
Zheng Yan, Xidian University, China/Aalto University, Finland
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Weirong Liu, Central South University, China
Webmaster
Jie Wang, Central South University, China
Contact
Please email inquiries concerning TrustData 2013 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the symposium organizers: trustdata2013 AT gmail DOT com
Copyright @ Trusted Computing Institute, CSU
http://trust.csu.edu.cn/
-----------------------------------------------------------------------------------
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
More information about the TCCC
mailing list