活动简介

New concepts of computing have recently emerged in order to enhance both real and virtual worlds towards smart worlds as well as cyber-physical-social-thinking integrated hyper worlds. Accordingly, computing systems are growing in capability and complexity. This includes aspects related to hardware, software, communications, networks, platforms, services, etc. Advanced computing (AC) aims at discovering, developing, and deploying computational and networking capabilities as well as designing and developing novel computing systems and architectures. At the same time, computing must be trustworthy to engender confidence that systems will remain secure and available. Trust/distrust relationships in the Internet, Web applications and pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted Computing (TC) aims at making computing and communication systems and services available, predictable, accountable, controllable, assessable, sustainable, dependable, persistent and secure. ATC conferences have taken a leading role addressing these challenges in achieving practical advanced computing systems with truly trustworthy services. Started in 2005, the succesful series of ATC conferences have been held as ATC 2015 Beijing China. ATC 2014 Bali Indonesia, ATC 2013 Vietri sul Mare Italy, ATC 2012 Fukuoka Japan, ATC 2011 Banff Canada, ATC 2010 Xi’An China, ATC 2009 Brisbane Australia, ATC 2008 Oslo Norway, ATC 2007 Hong Kong China, ATC 2006 Wuhan China,... ATC 2016 will include a highly selective program of technical papers, accompanied by workshops, panel discussions, and keynote speeches. Established as a premier venue in the area of advanced and trusted computing, ATC 2016 will offer a forum for researchers to exchange ideas and experiences in the most innovative research and development in these challenging areas and include all technical aspects related to advanced computing (AC) and trusted computing (TC).

征稿信息

重要日期

2016-04-08
初稿截稿日期

征稿范围

The 13th IEEE International Conference on Advanced and Trusted Computing deals with the different aspects related to the design, development and deployment of computational and networking capabilities as well as the design and development of computing systems and architectures. It deals also with fault tolerance and security issues in computing. 

Authors are encouraged to submit unpublished original research works in one of the following tracks. Topics of interest include, but are not limited to:

 

Track1. Software Defined Networking Security and Trust

  • SDN-related security risks, threats and attacks

  • SDN as Single point of failure

  • Proofs of security in SDN-based networks

  • Logic flaws in SDN implementations

  • SDN controller subversion

  • Authentication/confidentiality in SDN-based networks

  • Attacks/defense to SDN controllers, protocols, and APIs

  • Trust management of SDN applications and controllers

  • SDN-enabling security management and mitigation

 

Track 2. Cryptocurrencies and Blockchain based Systems

  • Anonymity and privacy in cryptocurrencies

  • Cryptocurrency based trust systems

  • Security analysis of existing cryptocurrencies

  • Formal threat models in cryptocurrency systems

  • Improvement proposals for existing cryptocurrencies

  • P2P network cryptocurrencies analysis

  • Private transactions in blockchain based systems

  • Problem based mining for cryptocurrencies, like PrimeCoin

  • Mining mechanisms: proof-of-work, proof of stake, proof of burn,

  • New usages of the blockchain technology

  • Scalability solutions for blockchain systemsSmart contracts

 

Track 3. Privacy Preservation in Big Data

  • Statistical Disclosure Control for big data

  • Privacy-preserving Data Mining for big data

  • Anonymization techniques for big data

  • Privacy for stream data

  • Anonymization of stream data

  • Privacy for big social networks related data

  • Sociological/political implications of privacy and big data

  • Privacy metrics for big data

  • Privacy implication of big data

  • Parallelization of data privacy methods- Privacy in big networks

 

Track 4. Middleware for IoT

  • Advanced models and services

  • Trustworthy middleware services

  • Consistency middleware management

  • Security and trust middleware algorithms

  • Service session continuity

  • Domain specific meta-models

  • Trustworthy context-awareness

  • Adaptation context managers

 

Track 5. Trust Models Management and Standards

  • Trust reputation models

  • Formal methods for trust

  • Distributed trust management

  • Standards for trust

  • Cryptography for trust management

  • Applied trust systems

  • Trust architectures

  • Trust adaptive systems

  • Trust in collaborative environments

  • Trust in cloud computing.

 

Track 6. Trustworthy authentication in Pervasive Computing

  • Trusted computing for authentication

  • Privacy preserving authentication

  • User centric authentication

  • Overcoming the limitations of passwords for authentication

  • Proximity authentication and distance bounding protocols.

  • Authentication in IoT

  • Wearable authentication

  • Behavioral biometrics for authentication

  • Lightweight authentication mechanisms

 

Track 7. Service Engineering for IoT

  • Abstraction and composition services

  • Consistency and semantic validation

  • Abstraction of global services

  • Interoperability and portability models

  • Adaption of applications and environments

  • Advanced IoT architectures

  • Trustworthy inter-domain deployment

  • Assessment techniques and benchmarks

 

Track 8. Trust, Security and Privacy in Social Networks

  • Privacy and security in social systems

  • Trust and reputation schemes

  • Federation and identity management

  • Social implications of security and trust

  • Authentication and authorization models

  • Risk management and policy models

  • Anonymity in social networks

  • Semantics, metrics and models

  • Benchmarking, modeling and performance

  • Management of social network data

  • Detection and prevention of social misbehavior

 

Track 9. Privacy and trust management in distributed systems  

  • Privacy-preserving trust management 

  • Cloud and collaborative P2P networks: privacy issues and trust 

  • Trust-enforcing privacy protection 

  • Anonymous user modeling  and reputation management in distributed systems 

  • Anonymous trust-based recommender systems 

  • Privacy-preserving trust-based negotiations in distributed systems 

  • Collaboration enforcement in P2P networks via trust 

  • Privacy-preserving trust-based applications: social networks, vehicles, mobile computing, etc. 

  • Privacy and trust metrics 

  • Privacy-preserving/implicit authentication and identity management 

  • Trust and reputation models in social networks 

  • Identity and trust management in P2P networks 

 

Track 10. Privacy and Security in Smart City Environment: A Synergy of IoT, Big Data and Cloud

  • Smart Mobility and Clouds 

  • Smart Homes and Clouds 

  • Smart and Intelligent Urban Data Analytics 

  • Context Aware systems for Smart Cities 

  • Smart Cities Big data management 

  • Smart Cities Data Analytics 

  • Security and fault tolerance for smart systems 

  • Tele-health security in cloud computing 

  • Cyber Security in emergent technologies 

  • Secure Smart City Governance

 

Track 11. Advanced Intelligent Computing and Algorithms for Sensory Data

  • Scalable infrastructure for sensory data management 

  • Large-scale sensory data processing and mining 

  • Heterogeneous sensory data management 

  • Real-time sensory data processing 

  • Reliability guarantee of data engineering 

  • Flexible Cloud platforms for applications based on sensory data 

  • Automatic tracing and response of data evolution 

  • Business service model for sensory data 

  • Intelligent services for data processing and sharing 

  • Smart composition, virtualization and integration on data services 

  • User-friendly tools for sensory data intelligence 

  • Practical applications on sensory data 

  • Location based services and their cyberinfrastructure 

 

Track 12.  Multi-modal Fusion for Cognitive Computing

  • Multi-view learning 

  • Joint representation learning for multi-modal information 

  • Deep learning for multi-modal fusion 

  • Online multi-modal fusion learning 

  • Multi-modal fusion for web information processing 

  • Cognitive computing for robotics 

  • New datasets for multi-modal information fusion 

 

Track 13.  Advanced Data Analytics in Future Intellectual Work: Theory and Practice 

  • System Design for Advanced e-work 

  • Strategic Data Accumulation in Intellectual Work 

  • Knowledge Management and Discovery 

  • Mechanism for Advanced Skill Training and its Practice 

  • Trusted System for Intelligent Work in Unstable Environment 

  • Extraction of Processes in Future Intellectual Work 

  • Information Visualization 

  • Learning Analytics

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    07月18日

    2016

    07月21日

    2016

  • 04月08日 2016

    初稿截稿日期

  • 07月21日 2016

    注册截止日期

历届会议
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询