picture_1 picture_2 picture_3 picture_4 picture_5 picture_6 picture_7 picture_8
IEEE RATSP 2015

The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications
held in conjunction with IEEE TrustCom-15

August 20-22, 2015, Helsinki, Finland


With the rapid development and increasing complexity of computer and communication systems, user requirements for trust, security and privacy are becoming more and more demanding. Traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing and communications environments. New challenges attract scientific and technical exploration and investigation to allow users to enjoy more advanced services and applications while preserving trust, security and privacy at the same time.


This symposium focuses on innovative methods and techniques for addressing on trusted computing and communications. It aims to provide a forum to discuss recent advances on all aspects of Trust, Security and Privacy in Computing and Communications.


Scope and Interests
Topics of interests include but are not limited to:

  • Trust semantics, metrics and models
  • Trusted computing platform
  • Trusted network computing
  • Trusted operating systems
  • Trusted and secure software and applications
  • Trust, security and privacy in social networks
  • Trust, security and privacy in grid/cloud/pervasive computing
  • Trust, security and privacy in parallel and distributed systems
  • Trust, security and privacy in e-commerce and e-government
  • Risk and reputation management
  • Trust, security and privacy in mobile and wireless communications
  • Trust, security and privacy of 5G
  • Trust, security and privacy in database systems
  • Trust, security and privacy of web applications and services
  • Trust, security and privacy in network deployment and management
  • Network security
  • Computer security
  • Policy, model and architecture of trust, security and privacy
  • Authentication, authorization and accounting

Submission and Publication Instructions

Submitted papers must not overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf).


Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected best papers will be published in high quality international journals.


Important Dates

Submission deadline: May 25th, 2015
Authors notification: June 10th, 2015
Camera-ready due: July 1st, 2015
Registration: July 1st, 2015


General Co-Chairs

Zheng Yan, Xidian University, China
Peter Mueller, IBM Zurich, Switzerland


Program Co-Chairs

Xiangjian (Sean) He, University of Technology, Sydney, Australia
Xinyi Huang, Fujian Normal University, China
Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy


Program Committee Members

See here


Contact

Please email inquiries concerning the symposium to Prof. Zheng Yan.

TRUSTCOM
ISPA
BDSE
IEEE
IEEE-CS
IEEE-TCSC
Aalto ELEC
isn-xidian