Conferences In Information Security

Conference Name The 2010 IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications
Venue Macau SAR, China
URL http://trust.csu.edu.cn/conference/tsp2009/
Submission Deadline 31-May-10
Conference Date Octobar 5-7, 2010
Sponsership/Publisher IEEE
Aim/Scope/Research Area Introduction
Satisfying user requirements for trust, security and privacy in an efficient way is one of the first considerations for almost all emerging applications, using emerging technologies such as pervasive computing, peer to peer computing, grid computing, cloud computing, virtualization and, mobile and wireless technologies. Challenges arise as emerging applications evolve to provide more scalable and comprehensive services. One of the biggest challenges is that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, and distributed computing environments. Therefore, we need to build networks and systems in which emerging applications allow users to enjoy more scalable and comprehensive services while preserving trust, security and privacy at the same time.
Following the success of TSP 2008 in Shanghai, China during December 17-20, 2008, and TSP-09 in Macau SAR, China, during October 12-14, 2009, “The Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10)” will be held in Bradford, UK, during June 29-July 1, 2010, in conjunction with “The 10th IEEE International Conference on Computer and Information Technology (CIT 2010)”, aims at bringing together researchers and practitioners in the world working on trust, security, privacy, and related issues such as technical, social, and cultural implications for all emerging devices, services, applications, networks, and systems, and providing a forum for them to present and discuss emerging ideas and trends in this highly challenging research area.

Scope and Interests
TSP-10 is an international forum for presenting and discussing emerging ideas and trends in trust, security and privacy for emerging applications from both the research community as well as the industry. Topics of interest include, but are not limited to:
(1) TSP metrics, architectures, and models
(2) TSP in pervasive computing
(3) TSP in peer to peer computing
(4) TSP in grid computing
(5) TSP in cloud computing
(6) TSP in mobile and wireless communications
(7) TSP in cyber-physical systems
(8) TSP in parallel and distributed systems
(9) TSP in e-commerce and e-government systems
(10) TSP in hardware and software co-design
(11) TSP in operating systems
(12) TSP in database systems
(13) TSP in virtualization technologies
(14) Privacy and anonymity technologies
(15) Risk analysis and management
(16) Reliability, dependability, and fault tolerance
(17) Network attacks and defenses
(18) Cryptography and security protocols
(19) Authentication, access control, and accounting
(20) Miscellaneous TSP issues

Back To Conferences List

Database Sections