Conferences In Information Security

Conference Name The 2010 IEEE/IFIP International Symposium on Trusted Computing and Communications
Venue Vancouver, Canada
URL http://trust.csu.edu.cn/conference/trustcom2009/
Submission Deadline 15-May-10
Conference Date 8/29-31/2010
Sponsership/Publisher IEEE
Aim/Scope/Research Area Introduction
With the rapid development and the increasing complexity of computer and communications systems and networks, traditional security technologies and measures can not meet the demand for integrated and dynamic security solutions. As a challenging and innovative research field, trusted computing and communications target computer and communications systems and networks that are available, secure, reliable, controllable, dependable, and so on. In a word, they must be trustworthy. If we view the traditional security as identity trust, the broader field of trusted computing and communications also includes behavior trust of systems and networks. In fact, trusted computing and communications have become essential components of various distributed services, applications, and systems, including self-organizing networks, social networks, semantic webs, e-commence, and e-government.
Following the success of TrustCom 2008 in Zhangjiajie, China during November 18-21, 2008, the 2009 IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2009), to be held in conjunction with the 2009 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-09), aims at bringing together researchers and practitioners in the world working on trusted computing with regard to security, safety, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum for them to present and discuss emerging ideas and trends in this highly challenging research field.

Scope and Interests
TrustCom 2009 is an international forum for presenting and discussing emerging ideas and trends in trusted computing in computer systems and networks from both the research community as well as the industry. Topics of interest include, but are not limited to:
(1) Semantics, metrics and models of trust
(2) Trust establishment, propagation, and management
(3) Trusted computing platform
(4) Trusted network computing
(5) Trusted operating system
(6) Trusted software
(7) Trusted database
(8) Trusted services and applications
(9) Trust in e-commerce and e-government
(10) Trust in mobile and wireless networks
(11) Cryptography and security protocols
(12) Reliable and fault-tolerant computer systems/networks
(13) Survivable computer systems/networks
(14) Authentication in computer systems/networks
(15) Access control in computer systems/networks
(16) Key management in computer systems/networks
(17) Trust-related security and privacy
(18) Trusted communications

Back To Conferences List

Database Sections