Apologies if you received multiple copies of this TrustData-13 CFPs with 8
SCI & EI Indexed Journal Special Issues Shared by CSS 2013 & its
Symposiums/Workshops.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Call for Papers for the 2013 International Workshop on Trust, Security and
Privacy
for Big Data (TrustData-13)

Venue & Dates: Zhangjiajie, China, November 13-15, 2013
http://trust.csu.edu.cn/conference/TrustData2013

In Conjunction with

The 5th International Symposium on Cyberspace Safety and Security (CSS 2013)
http://trust.csu.edu.cn/conference/CSS2013


------------
Highlight:
------------

Distinguished papers, after further revisions, will be published in the
following SCI & EI indexed journal special issues Shared by CSS 2013 & its
Symposiums/Workshops:

(1) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 2.833)
http://www.journals.elsevier.com/information-sciences/

(2) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact
Factor: 1.978)
http://www.journals.elsevier.com/future-generation-computer-systems/

(3) IEEE Systems Journal (SCI&EI Indexed, Impact Factor: 0.923)
http://ieeesystemsjournal.org/

(4) Computers & Security - Elsevier (SCI&EI Indexed, Impact Factor: 0.868)
http://ees.elsevier.com/cose/

(5) International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) -
INDERSCIENCE (SCI&EI Indexed, Impact Factor: 0.848)
http://www.inderscience.com/jhome.php?jcode=IJAHUC

(6) Security and Communication Networks - Wiley (SCI&EI Indexed, Impact
Factor: 0.414)
http://www.interscience.wiley.com/security

(7) *International Journal of Computational Science and Engineering (IJCSE)
- INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJCSE

(8) *International Journal of Autonomous and Adaptive Communications
Systems (IJAACS) - INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJAACS

*Selected papers from this conference will be published directly in those
journal special issues (they will NOT appear in the conference proceedings).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Introduction

The proliferation of new technologies such as Internet of Things and cloud
computing
calls for innovative ideas to retrieve, filter, and integrate data from a
large number
of diverse data sources. Big Data is an emerging paradigm applied to
datasets whose
volume/velocity/variability is beyond the ability of commonly used software
tools to
manage and process the data within a tolerable period of time. More
importantly, Big
Data has to be of high value, and should be protected in an efficient way.
Since Big
Data involves a huge amount of data that is of high-dimensionality and
inter-linkage,
existing trust, security, and privacy measures for traditional databases
and
infrastructures cannot satisfy its requirements. Novel technologies for
protecting Big
Data are attracting researchers and practitioners with more and more
attention.


Scope and Interests

The 2013 International Workshop on Trust, Security and Privacy for Big Data
(TrustData-13)
aims to bring together people from both academia and industry to present
their most
recent work related to trust, security and privacy issues in Big Data, and
exchange
ideas and thoughts in order to identify emerging research topics and define
the future of
Big Data. Topics of interest include, but are not limited to:


Trust Track
(1) Trust semantics, metrics, and models for Big Data
(2) Trust management and evaluation for Big Data
(3) Trusted systems, software, and applications for Big Data
(4) Trusted platform implementation technologies for Big Data
(5) Information quality/trustworthiness for Big Data
(6) Provenance of content for Big Data
(7) Trustworthiness of ratings/recommender systems for Big Data

Security Track
(1) Security model and architecture for Big Data
(2) Data mining security for Big Data
(3) Software and system security for Big Data
(4) Intrusion detection for Gigabit Networks
(5) Cryptography and Big Data
(6) Visualizing large scale security data
(7) Threat detection using Big Data analytics
(8) Human computer interaction challenges for Big Data security
(9) Data protection, integrity standards and policies
(10) Security and legislative impacts for Big Data
(11) Managing user access for Big Data

Privacy Track
(1) Privacy in Big Data applications and services
(2) Privacy in Big Data end-point input validation and filtering
(3) Privacy in Big Data integration and transformation
(4) Privacy in parallel and distributed computation
(5) Privacy in Big Data storage management
(6) Privacy in Big Data access control mechanisms
(7) Privacy in Big Data mining and analytics
(8) Privacy in Big Data sharing and visualization
(9) Big Data privacy policies and standards


Submission and Publication Information

The accepted papers from this workshop will be published by Springer
Lecture Notes in
Computer Science (EI Compendex indexed). Submitted papers must not
substantially overlap with
papers that have been published or that are simultaneously submitted to a
journal or a
conference with proceedings. Papers must be clearly presented in English,
must not
exceed 10 pages (or 14 pages with the over length charge), including
tables, figures,
references and appendixes, in Springer LNCS Format with Portable Document
Format (.pdf).
Please submit your paper at
https://www.easychair.org/conferences/?conf=trustdata2013.

Papers will be selected based on their originality, timeliness,
significance, relevance,
and clarity of presentation. Distinguished papers, after further revisions,
will be
considered for possible publication in several SCI & EI indexed special
issues of prestigious
international journals. By submitting a paper to the workshop, authors
assure that if the paper
is accepted, at least one author will attend the workshop and present the
paper.
For no-show authors, their papers will be removed from the digital library
after the workshop
and their affiliations will be notified.


Important Dates

(1) Paper Submission Deadline:      June 15, 2013
(2) Authors Notification:           August 15, 2013
(3) Camera-Ready Paper Due:         September 15, 2013
(4) Conference Dates:               November 13-15, 2013


General Co-Chairs

Guojun Wang, Central South University, China
Jin-Hee Cho, U.S. Army Research Laboratory, USA
Lizhe Wang, Chinese Academy of Sciences, China


Program Co-Chairs

Qin Liu, Central South University, China
Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria
Yongming Xie, Guangzhou University, China


Program Committee (In alphabetical order)
http://trust.csu.edu.cn/conference/TrustData2013


Publicity Co-Chairs

Zheng Yan, Xidian University, China/Aalto University, Finland
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Weirong Liu, Central South University, China


Webmaster

Jie Wang, Central South University, China


Contact

Please email inquiries concerning TrustData 2013 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the symposium organizers: trustdata2013 AT gmail DOT com

Copyright @ Trusted Computing Institute, CSU
http://trust.csu.edu.cn/
-----------------------------------------------------------------------------------
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

Reply via email to