Apologies if you received multiple copies of this IEEE TrustData 2014 CFPs (Paper Submission Deadline: May 10, 2014)
-------------------------------------------------------------------------------------------------------------------- Call for Papers for the 5th IEEE International Workshop on Trust, Security and Privacy for Big Data (TrustData 2014) Dalian, China, August 24-27, 2014 http://trust.csu.edu.cn/conference/TrustData2014/ In Conjunction with The 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014) Dalian, China, August 24-27, 2014 http://action.dlmu.edu.cn/uscience/dasc2014/index.shtml Introduction The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative ideas to retrieve, filter, and integrate data from a large number of diverse data sources. Big Data is an emerging paradigm applied to datasets whose volume/velocity/variability is beyond the ability of commonly used software tools to manage and process the data within a tolerable period of time. More importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust, security, and privacy measures for traditional databases and infrastructures cannot satisfy its requirements. Novel technologies for protecting Big Data are attracting researchers and practitioners with more and more attention. Scope and Interests The 5th IEEE International Workshop on Trust, Security and Privacy for Big Data (TrustData 2014) aims to bring together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data. Topics of interest include, but are not limited to: Trust Track (1) Trust semantics, metrics, and models for Big Data (2) Trust management and evaluation for Big Data (3) Trusted systems, software, and applications for Big Data (4) Trusted platform implementation technologies for Big Data (5) Information quality/trustworthiness for Big Data (6) Provenance of content for Big Data (7) Trustworthiness of ratings/recommender systems for Big Data Security Track (1) Security model and architecture for Big Data (2) Data mining security for Big Data (3) Software and system security for Big Data (4) Intrusion detection for Gigabit Networks (5) Cryptography and Big Data (6) Visualizing large scale security data (7) Threat detection using Big Data analytics (8) Human computer interaction challenges for Big Data security (9) Data protection, integrity standards and policies (10) Security and legislative impacts for Big Data (11) Managing user access for Big Data (12) Secure quantum communications Privacy Track (1) Privacy in Big Data applications and services (2) Privacy in Big Data end-point input validation and filtering (3) Privacy in Big Data integration and transformation (4) Privacy in parallel and distributed computation (5) Privacy in Big Data storage management (6) Privacy in Big Data access control mechanisms (7) Privacy in Big Data mining and analytics (8) Privacy in Big Data sharing and visualization (9) Big Data privacy policies and standards Submission and Publication Information All papers need to be submitted electronically through the conference website (http://www.easychair.org/conferences/?conf=ieeetrustdata2014) with PDF format. The materials presented in the papers should not be published or under submission elsewhere. Submit a full paper with 6 pages plus up to 2 extra pages (IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced), including figures and references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page: http://www.computer.org/portal/web/cscps/formatting. Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). Authors (at least one) of any accepted paper are requested to register at the conference. Important Dates (1) Paper Submission Deadline: May 10, 2014 (2) Authors Notification: June 10, 2014 (3) Camera-Ready Paper Due: June 30, 2014 (4) Conference Registration: June 30, 2014 (5) Conference Dates: August 24-27, 2014 Steering Co-Chairs Guojun Wang, Central South University, China Peter Mueller, IBM Zurich Research Laboratory, Switzerland General Co-Chairs Qin Liu, Hunan University, China Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria Program Co-Chairs Jin-Hee Cho, U.S. Army Research Laboratory, USA Lizhe Wang, Chinese Academy of Sciences, China Program Committee (In alphabetical order) http://trust.csu.edu.cn/conference/TrustData2014/ Publicity Co-Chairs Shui Yu, Deakin University, Australia Weirong Liu, Central South University, China Webmaster Xiangdong Lee, Central South University, China Contact Please email inquiries concerning TrustData 2013 to: Prof. Guojun Wang: csgjwang AT gmail DOT com and the symposium organizers: trustdata2013 AT gmail DOT com Copyright @ Trusted Computing Institute, CSU http://trust.csu.edu.cn/ -------------------------------------------------------------------------------------------------------------------- -- ----------------------------- Shui YU, PhD, Senior Lecturer School of Information Technology, Deakin University, 221 Burwood Highway, Burwood, VIC 3125, Australia. Telephone:0061 3 9251 7744 http://www.deakin.edu.au/~syu
_______________________________________________ Om-announce mailing list [email protected] http://openmath.org/mailman/listinfo/om-announce
