allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016)

google+
Views: 756                 

When :  2016-07-18

Where :  France

Submission Deadline :  2016-03-11

Categories :   Software Engineering & Security ,  Computer Science & Information Technology      

Untitled Document

13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016)

July 18-21, 2016

France

Call For Papers

The 13th IEEE International Conference on Advanced and Trusted Computing deals with the different aspects related to the design,  development and deployment  of computational and networking capabilities as well as the design and development of computing systems and architectures. It deals also with fault tolerance and security issues in computing. 

Topics

    Track1. Software Defined Networking Security and Trust
    - SDN-related security risks, threats and attacks
    - SDN as Single point of failure
    - Proofs of security in SDN-based networks
    - Logic flaws in SDN implementations
    - SDN controller subversion
    - Authentication/confidentiality in SDN-based networks
    - Attacks/defense to SDN controllers, protocols, and APIs
    - Trust management of SDN applications and controllers
    - SDN-enabling security management and mitigation

    Track 2. Cryptocurrencies and Blockchain based Systems
    - Anonymity and privacy in cryptocurrencies
    - Cryptocurrency based trust systems
    - Security analysis of existing cryptocurrencies
    - Formal threat models in cryptocurrency systems
    - Improvement proposals for existing cryptocurrencies
    - P2P network cryptocurrencies analysis
    - Private transactions in blockchain based systems
    - Problem based mining for cryptocurrencies, like PrimeCoin
    - Mining mechanisms: proof-of-work, proof of stake, proof of burn,
    - New usages of the blockchain technology
    - Scalability solutions for blockchain systems- Smart contracts

    Track 3. Privacy Preservation in Big Data
    - Statistical Disclosure Control for big data
    - Privacy-preserving Data Mining for big data
    - Anonymization techniques for big data
    - Privacy for stream data
    - Anonymization of stream data
    - Privacy for big social networks related data
    - Sociological/political implications of privacy and big data
    - Privacy metrics for big data
    - Privacy implication of big data
    - Parallelization of data privacy methods- Privacy in big networks

    Track 4. Middleware for IoT
    - Advanced models and services
    - Trustworthy middleware services
    - Consistency middleware management
    - Security and trust middleware algorithms
    - Service session continuity
    - Domain specific meta-models
    - Trustworthy context-awareness
    - Adaptation context managers

    Track 5. Trust Models Management and Standards
    - Trust reputation models
    - Formal methods for trust
    - Distributed trust management
    - Standards for trust
    - Cryptography for trust management
    - Applied trust systems
    - Trust architectures
    - Trust adaptive systems
    - Trust in collaborative environments
    - Trust in cloud computing.

    Track 6. Trustworthy authentication in Pervasive Computing
    - Trusted computing for authentication
    - Privacy preserving authentication
    - User centric authentication
    - Overcoming the limitations of passwords for authentication
    - Proximity authentication and distance bounding protocols.
    - Authentication in IoT
    - Wearable authentication
    - Behavioral biometrics for authentication
    - Lightweight authentication mechanisms

    Track 7. Service Engineering for IoT
    - Abstraction and composition services
    - Consistency and semantic validation
    - Abstraction of global services
    - Interoperability and portability models
    - Adaption of applications and environments
    - Advanced IoT architectures
    - Trustworthy inter-domain deployment
    - Assessment techniques and benchmarks

    Track 8. Trust, Security and Privacy in Social Networks
    - Privacy and security in social systems
    - Trust and reputation schemes
    - Federation and identity management
    - Social implications of security and trust
    - Authentication and authorization models
    - Risk management and policy models
    - Anonymity in social networks
    - Semantics, metrics and models
    - Benchmarking, modeling and performance
    - Management of social network data
    - Detection and prevention of social misbehavior

    Track 9. Privacy and trust management in distributed systems  
    - Privacy-preserving trust management 
    - Cloud and collaborative P2P networks: privacy issues and trust 
    - Trust-enforcing privacy protection 
    - Anonymous user modeling  and reputation management in distributed systems 
    - Anonymous trust-based recommender systems 
    - Privacy-preserving trust-based negotiations in distributed systems 
    - Collaboration enforcement in P2P networks via trust 
    - Privacy-preserving trust-based applications: social networks, vehicles, mobile computing, etc. 
    - Privacy and trust metrics 
    - Privacy-preserving/implicit authentication and identity management 
    - Trust and reputation models in social networks 
    - Identity and trust management in P2P networks 

IMPORTANT DATES            

  • Paper submission: March 11, 2016 
  •                        
  • Notification of acceptance: May 6, 2016 
  •            
  • Final manuscripts due: May 20, 2016 
  •                        

    User Name : MANI
    Posted on


    Related CFPs

    NCS 2026   18th International Conference on Network and Communications Security (NCS 2026)
    IJCACS   International Journal of Control, Automation, Communication and Systems
    AIDMK 2026   14th International Conference on Artificial Intelligence, Data Mining & Knowledge Management (AIDMK 2026)
    IJCCSA   International Journal on Cloud Computing: Services and Architecture

    All Rights Reserved @ Call for Papers - Conference & Journals