IEEE International Conference on Trust, Security and Privacy in Computing and Communications
摘要截稿:
全文截稿: 2019-03-14
开会时间: 2019-08-05
会议难度:
CCF分类: C类
会议地点: Rotorua, New Zealand
Overview
In a fast-growing cyber security threat landscape, game-changing techniques in information security, trust, privacy and forensics are required for a sustainable future. CROW and STRATUS are proud to host the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-19) which will be held at Rotorua, New Zealand on 5-8 August 2019.
As a leading international conference in the area of trust, information security and privacy, and forensics, the IEEE TrustCom 2019 conference aims to bring together international researchers and practitioners working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks – providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.
Topics of interest include, but not limited to:
Trust Track
Trust semantics, metrics and models, Trusted computing platform, Trusted network computing, Trusted operating systems, Trusted software and applications, Trust in social networks, Trust in e-commerce and e-government, Trust in mobile and wireless communications, Trust in automotive environments, Trust visualization, Risk and reputation management, Survivable computer systems/networks, Trust of 5G, Hardware for chains and roots of trust, Software trustworthiness and quality, Provenance for trust, Novel techniques in provenance
Security Track
Network security, Computer security, Database security, Hardware security, Side-Channel attacks, Fault attacks, Obfuscation and reverse engineering, Web applications security, Machine learning applied to security applications, Security policy, model and architecture, Security in social networks, Security in parallel and distributed systems, Security in mobile and wireless communications, Security of 5G, Security in grid/cloud/pervasive/fog/edge computing, Authentication, authorization and accounting, Emerging topics in information security and applied cryptography, Miscellaneous security issues, Provenance for security, Emerging topics in security attribution, Consumer/User-centric security
Privacy Track
Privacy in Web-based applications and services, Privacy in database systems, Privacy in parallel and distributed systems, Privacy in grid/cloud/pervasive computing, Privacy in mobile and wireless communications, Privacy in e-commerce and e-government, Privacy in network deployment and management, Privacy and policy conformance (GDPR, HIPPA, etc.), Privacy and trust, Privacy and security, Privacy and anonymity, Privacy preservation in 5G, Privacy in surveillance systems, Miscellaneous privacy issues, Consumer/User-centric privacy
Forensics and Analytics Track
Anti-forensics, Biometrics, Cryptanalysis, Big data forensics, CCTV forensics, Cloud forensics, Computational forensics, Cyber-physical system forensics, Data Mining for forensics, Facial recognition, Fingerprint forensics, Image forensics, Malware forensics, Mobile app forensics (e.g. Skype, WeChat and Facebook), Mobile device forensics, Multimedia forensics, Network forensics, Steganography and steganalysis, System reverse engineering, Watermarking, Automotive Forensics, Behavioural biometrics