New concepts of computing have recently emerged in order to enhance both real and virtual worlds towards smart worlds as well as cyber-physical-social-thinking integrated hyper worlds. Accordingly, computing systems are growing in capability and complexity. This includes aspects related to hardware, software, communications, networks, platforms, services, etc. Advanced computing (AC) aims at discovering, developing, and deploying computational and networking capabilities as well as designing and developing novel computing systems and architectures. At the same time, computing must be trustworthy to engender confidence that systems will remain secure and available. Trust/distrust relationships in the Internet, Web applications and pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted Computing (TC) aims at making computing and communication systems and services available, predictable, accountable, controllable, assessable, sustainable, dependable, persistent and secure. ATC conferences have taken a leading role addressing these challenges in achieving practical advanced computing systems with truly trustworthy services. Started in 2005, the succesful series of ATC conferences have been held as ATC 2015 Beijing China. ATC 2014 Bali Indonesia, ATC 2013 Vietri sul Mare Italy, ATC 2012 Fukuoka Japan, ATC 2011 Banff Canada, ATC 2010 Xi’An China, ATC 2009 Brisbane Australia, ATC 2008 Oslo Norway, ATC 2007 Hong Kong China, ATC 2006 Wuhan China,... ATC 2016 will include a highly selective program of technical papers, accompanied by workshops, panel discussions, and keynote speeches. Established as a premier venue in the area of advanced and trusted computing, ATC 2016 will offer a forum for researchers to exchange ideas and experiences in the most innovative research and development in these challenging areas and include all technical aspects related to advanced computing (AC) and trusted computing (TC).
The 13th IEEE International Conference on Advanced and Trusted Computing deals with the different aspects related to the design, development and deployment of computational and networking capabilities as well as the design and development of computing systems and architectures. It deals also with fault tolerance and security issues in computing.
Authors are encouraged to submit unpublished original research works in one of the following tracks. Topics of interest include, but are not limited to:
Track1. Software Defined Networking Security and Trust
SDN-related security risks, threats and attacks
SDN as Single point of failure
Proofs of security in SDN-based networks
Logic flaws in SDN implementations
SDN controller subversion
Authentication/confidentiality in SDN-based networks
Attacks/defense to SDN controllers, protocols, and APIs
Trust management of SDN applications and controllers
SDN-enabling security management and mitigation
Track 2. Cryptocurrencies and Blockchain based Systems
Anonymity and privacy in cryptocurrencies
Cryptocurrency based trust systems
Security analysis of existing cryptocurrencies
Formal threat models in cryptocurrency systems
Improvement proposals for existing cryptocurrencies
P2P network cryptocurrencies analysis
Private transactions in blockchain based systems
Problem based mining for cryptocurrencies, like PrimeCoin
Mining mechanisms: proof-of-work, proof of stake, proof of burn,
New usages of the blockchain technology
Scalability solutions for blockchain systems- Smart contracts
Track 3. Privacy Preservation in Big Data
Statistical Disclosure Control for big data
Privacy-preserving Data Mining for big data
Anonymization techniques for big data
Privacy for stream data
Anonymization of stream data
Privacy for big social networks related data
Sociological/political implications of privacy and big data
Privacy metrics for big data
Privacy implication of big data
Parallelization of data privacy methods- Privacy in big networks
Track 4. Middleware for IoT
Advanced models and services
Trustworthy middleware services
Consistency middleware management
Security and trust middleware algorithms
Service session continuity
Domain specific meta-models
Trustworthy context-awareness
Adaptation context managers
Track 5. Trust Models Management and Standards
Trust reputation models
Formal methods for trust
Distributed trust management
Standards for trust
Cryptography for trust management
Applied trust systems
Trust architectures
Trust adaptive systems
Trust in collaborative environments
Trust in cloud computing.
Track 6. Trustworthy authentication in Pervasive Computing
Trusted computing for authentication
Privacy preserving authentication
User centric authentication
Overcoming the limitations of passwords for authentication
Proximity authentication and distance bounding protocols.
Authentication in IoT
Wearable authentication
Behavioral biometrics for authentication
Lightweight authentication mechanisms
Track 7. Service Engineering for IoT
Abstraction and composition services
Consistency and semantic validation
Abstraction of global services
Interoperability and portability models
Adaption of applications and environments
Advanced IoT architectures
Trustworthy inter-domain deployment
Assessment techniques and benchmarks
Track 8. Trust, Security and Privacy in Social Networks
Privacy and security in social systems
Trust and reputation schemes
Federation and identity management
Social implications of security and trust
Authentication and authorization models
Risk management and policy models
Anonymity in social networks
Semantics, metrics and models
Benchmarking, modeling and performance
Management of social network data
Detection and prevention of social misbehavior
Track 9. Privacy and trust management in distributed systems
Privacy-preserving trust management
Cloud and collaborative P2P networks: privacy issues and trust
Trust-enforcing privacy protection
Anonymous user modeling and reputation management in distributed systems
Anonymous trust-based recommender systems
Privacy-preserving trust-based negotiations in distributed systems
Collaboration enforcement in P2P networks via trust
Privacy-preserving trust-based applications: social networks, vehicles, mobile computing, etc.
Privacy and trust metrics
Privacy-preserving/implicit authentication and identity management
Trust and reputation models in social networks
Identity and trust management in P2P networks
Track 10. Privacy and Security in Smart City Environment: A Synergy of IoT, Big Data and Cloud
Smart Mobility and Clouds
Smart Homes and Clouds
Smart and Intelligent Urban Data Analytics
Context Aware systems for Smart Cities
Smart Cities Big data management
Smart Cities Data Analytics
Security and fault tolerance for smart systems
Tele-health security in cloud computing
Cyber Security in emergent technologies
Secure Smart City Governance
Track 11. Advanced Intelligent Computing and Algorithms for Sensory Data
Scalable infrastructure for sensory data management
Large-scale sensory data processing and mining
Heterogeneous sensory data management
Real-time sensory data processing
Reliability guarantee of data engineering
Flexible Cloud platforms for applications based on sensory data
Automatic tracing and response of data evolution
Business service model for sensory data
Intelligent services for data processing and sharing
Smart composition, virtualization and integration on data services
User-friendly tools for sensory data intelligence
Practical applications on sensory data
Location based services and their cyberinfrastructure
Track 12. Multi-modal Fusion for Cognitive Computing
Multi-view learning
Joint representation learning for multi-modal information
Deep learning for multi-modal fusion
Online multi-modal fusion learning
Multi-modal fusion for web information processing
Cognitive computing for robotics
New datasets for multi-modal information fusion
Track 13. Advanced Data Analytics in Future Intellectual Work: Theory and Practice
System Design for Advanced e-work
Strategic Data Accumulation in Intellectual Work
Knowledge Management and Discovery
Mechanism for Advanced Skill Training and its Practice
Trusted System for Intelligent Work in Unstable Environment
Extraction of Processes in Future Intellectual Work
Information Visualization
Learning Analytics
07月18日
2016
07月21日
2016
初稿截稿日期
注册截止日期
2015年08月10日 中国 北京市
第十二届IEEE先进与可信计算国际会议
留言