[Om-announce] TSP 2015 Call for Papers:The Fifth International Symposium on Trust, Security and Privacy for Emerging Applications,Zhangjiajie, China, November 18-20, 2015

Wenjun Jiang (姜文君) wenjj8a at 163.com
Fri Mar 27 05:07:54 CET 2015

TSP 2015 | Call for Papers
The Fifth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2015)
Zhangjiajie, China, November 18-20, 2015

Authors of selected, high-quality papers of the symposium would be invited to submit their improved
versions to one of SCI & EI indexed  Special Issues (confirmed), including:
(1) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 3.893, 5-Year Impact Factor: 3.969)
(2) Mobile Information Systems - Hindawi (SCI&EI Indexed, Impact Factor: 1.789)
(3) IEICE Transactions on Information and Systems (SCI&EI Indexed, Impact Factor: 0.191)
(4) International Journal of Computational Science and Engineering (IJCSE) - INDERSCIENCE (EI Indexed)
(5) International Journal of Embedded Systems (IJES) - INDERSCIENCE (EI Indexed)
(6) International Journal of High Performance Computing and Networking (IJHPCN) - INDERSCIENCE (EI Indexed)
In Conjunction with ICA3PP 2015 [http://trust.csu.edu.cn/conference/ICA3PP2015/]
Co-Located with IEEE PRDC 2015 [http://prdc.dependability.org/PRDC2015/index.html]
Hosted by:
College of Computer Science and Electronic Engineering, Hunan University, China
and Trusted Computing Institute, Central South University, China [http://trust.csu.edu.cn/]
Technical Sponsorship:
Springer Lecture Notes in Computer Science
TSP 2015 is a timely event that aims at bringing together researchers and practitioners in the world working on trust, security, and privacy
issues in  social networks, cloud computing, Internet of Things (IoT), wireless sensor networks, and other networking environments or system
applications; and providing a forum for them to present and discuss emerging ideas and trends in this highly challenging research area. 
Satisfying user requirements for trust, security and privacy in an efficient way is one of the first considerations for almost all emerging
applications, using emerging technologies such as pervasive computing, peer to peer computing, grid computing, cloud computing,
virtualization and, mobile and wireless technologies. Challenges arise as emerging applications evolve to provide more scalable and
comprehensive services. One of the biggest challenges is that traditional security technologies and measures may not meet user requirements
in open, dynamic, heterogeneous, and distributed computing environments. Therefore, we need to build networks and systems in which emerging
applications allow users to enjoy more scalable and comprehensive services while preserving trust, security and privacy at the same time.
Following the success of TSP 2008 in Shanghai, China during December 17-20, 2008, TSP-09 in Macau SAR, China, during October 12-14, 2009,
TSP-10 in Bradford, UK, during June 29-July 1, 2010, and TSP-13 in Zhangjiajie, China, during November 13-15, 2013, “The Fifth International
Symposium on Trust, Security and Privacy for Emerging Applications (TSP-15)” will be held in Zhangjiajie, China, during November 18-20, 2015,
in conjunction with “The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015)."

Scope and Interests
TSP is an international symposium for presenting and discussing emerging ideas and trends, algorithms and applications, systems design
techniques, platforms and tools, as well as measurement assessment tools in all aspects of the trust, security, and privacy issues of
networks. Topics include, but are not limited to, the following research directions(1) TSP metrics, architectures, and models 
(1) TSP metrics, architectures, and models
(2) TSP in big data
(3) TSP in pervasive computing
(4) TSP in peer to peer computing
(5) TSP in social computing (online/mobile social networks)
(6) TSP in cloud computing
(7) TSP in mobile and wireless communications
(8) TSP in cyber-physical systems
(9) TSP in parallel and distributed systems
(10) TSP in e-commerce and e-government systems
(11) TSP in hardware and software co-design
(12) TSP in operating systems
(13) TSP in database systems
(14) TSP in virtualization technologies
(15) Privacy and anonymity technologies
(16) Risk analysis and management
(17) Reliability, dependability, and fault tolerance
(18) Network attacks and defenses
(19) Cryptography and security protocols
(20) Authentication, access control, and accounting

Submission and Publication Information
All papers in PDF format need to be submitted electronically through the symposium website
(https://easychair.org/conferences/?conf=TSP2015). Submitted papers must not substantially
overlap with papers that have been published or that are simultaneously
submitted to a journal or a conference with proceedings. Papers must be clearly presented in English,
must not exceed 10 pages (or 14 pages with the over length charge), including tables, figures,
references and appendixes, in Springer LNCS Format with PDF. The majority of papers that
finally appear in the symposium will likely be the result of the symposium solicitation. Papers will
be evaluated based on their originality, significance, relevance, and clarity of presentation assessed
by at least three reviewers from respective research areas.
Submission of a paper should be regarded as a commitment that, should the paper be accepted,
at least one of the authors will register and present the work at the conference. All accepted papers
will be published by Springer LNCS (EI-Indexed).

Important Dates
(1) Paper Submission Deadline:   May 15, 2015 (11:59 PM Beijing Time)
(2) Author Notification:  July 15, 2015
(3) Camera-Ready Paper Due:   September 15, 2015
(4) Conference Dates:                   November 18-20, 2015
Steering Chairs
Wenjun Jiang, Hunan University, China (Chair)
Laurence T. Yang, St. Francis Xavier University, Canada
Guojun Wang, Central South University, China
Minyi Guo, Shanghai Jiao Tong University, China
Jie Li, University of Tsukuba, Japan
Jianhua Ma, Hosei University, Japan
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Indrakshi Ray, Colorado State University, USA
Kouichi Sakurai, Kyushu University, Japan
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Yang Xiang, Deakin University, Australia
Kun Yang, University of Essex, UK
Wanlei Zhou, Deakin University, Australia

General Co-Chairs
Geyong Min, The University of Bradford, UK
Vijay Varadharajan, Macquarie University, Australia
Ryan K. L. Ko, The University of Waikato, New Zealand

Program Co-Chairs
Dr. Imad Jawhar, Associate Professor, United Arab Emirates University, UAE
Deqing Zou, Huazhong University of Science of Technology

Program Committee Members (In alphabetical order)
Abdallah Mhamed, TELECOM SudParis, France
Adrian Waller, Thales Research and Technology (UK) Ltd., UK
Alex Aravind, University of Northern British Columbia, Canada
Aloysius Cheang, Cloud Security Alliance, Singapore
Amiya Nayak, University of Ottawa, Canada
Anupam Chattopadhyay, RWTH, Germany
Baoliu Ye, Nanjing University, P. R. China
Bimal Roy, Indian Statistical Institute, India
Chang-Ai Sun, University of Science and Technology Beijing, P. R. China
Christian Callegari, The University of Pisa, Italy
Christopher Leckie, University of Melbourne, Australia
Christoph Sorge, University of Paderborn, Germany
Chunhua Su, JAIST, Japan
Dhiah el Diehn I. Abou-Tair, University of Siegen, Germany
Francis Bu Sung Lee, Nanyang Technological University, Singapore
Franco Chiaraluce, Polytechnical University of Marche (UVPM), Italy
Gang Pan, Zhejiang University, P. R. China
Georgios Kambourakis, University of the Aegean, Greece
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Giovanni Russello, University of Auckland, New Zealand
Habtamu Abie, Norwegian Computing Center, Norway
Hai Jiang, Arkansas State University, USA
Haitao Lang, Beijing University of Chemical Technoloty
Hejun Wu, Sun Yat-Sen University, P. R. China
Imed Romdhani, Edinburgh Npier University, UK
Is-Haka Mkwawa, University of Plymouth, UK
Jianfeng Chu, Jilin University, China
Jianming Fu, Wuhan University, P. R. China
John A. Clark, University of York, UK
Joon S. Park, Syracuse University, USA
Jorde Forne, Universitat Politècnica de Catalunya (UPC), Spain
Juan Li, North Dakota State University, USA
Junzhao Du, Xidian University, P. R. China
Kannan Govindan, Samsung Research, India
Kenichi Takahashi, Tottori University, Japan
Lizhe Wang, Rochester Institute of Technology, USA
Luis Javier García Villalba, Complutense University of Madrid, Spain
Masakazu Soshi, Hiroshima City University, Japan
Melike Erol-Kantarci, University of Ottawa, Canada
Mingwu Zhang, Hubei University of Technology, China
Muneer Bani Yassein, Jordan University of Science and Technology, Jordan
Nils Gruschka, Fachhochschule Kiel, Germany
Peng Liu, Hangzhou Dianzi University, P. R. China
Pramode Verma, The University of Oklahoma-Tulsa, USA
Rajendra V. Boppana, UT San Antonio, USA
Ravi Jhawar, Università degli Studi di Milano, Italy
Ricardo Azevedo Pereira, Portugal Telecom Inovacao, Portugal
Robert C. H. Hsu, Chung Hua University, Taiwan
Roberto Di Pietro, Roma Tre University of Rome, Italy
Rongxing Lu, Nanyang Technological University, Singapore
Ruggero Donida Labati, Università degli Studi di Milano, Italy
Ruo Ando, NICT, Japan
Saad Bani Mohammad, Al al-Bayt University, Jordan
Salima Benbernou, Universite Paris Descartes, France
Sanjay Madria, Missouri University of Science and Technology, USA
Sheikh Mahbub Habib, TU Darmstadt, Germany
Sherali Zeadally, University of the District of Columbia, USA
Shucheng Yu, University of Arkansas at Little Rock, USA
Shui Yu, Deakin University, Australia
Sudip Chakraborty, Valdosta State University, USA
Sugang Xu, NICT, Japan
Tai-hoon Kim, Sungshin W. University, Korea
Tanya Ignatenko, Eindhoven University of Technology, The Netherlands
Toshihiro Yamauchi, Okayama University, Japan
Vincenzo Piuri, University of Milan, Italy
Volkmar Lotz, SAP Labs France, France
Willy Susilo, University of Wollongong, Australia
Xiaodong Lin, University of Ontario Institute of Technology, Canada
Xiaojun Hei, Huazhong University of Science and Technology, China
Xuanxia Yao, University of Science and Technology Beijing, China
Yanjiang Yang, Institute for Infocomm Research, Singapore
Yaxiong Zhao, Google Inc., USA
Yongdong Wu, Institute for Infocomm Research, Singapore
Yoshiaki Hori, Saga University, Japan
Yoshifumi UESHIGE, Nagasaki University, Japan
Yunsheng Wang, Kettering University, USA
Zhe Tang, Central South University, P. R. China

Publication Co-Chairs
Al-Sakib Khan Pathan, IIUM, Malaysia
Kejie Lu, University of Puerto Rico at Mayaguez, USA
Raja Naeem Akram, Edinburgh Napier, UK

Local Arrangement Co-Chairs
Fang Qi, Central South University, China
Qin Liu, Hunan University, China
Hongzhi Xu, Jishou University, China
Web Chair
Shan Peng, Central South University, China
Please email inquiries concerning TSP 2015 to:
Dr. Wenjun Jiang: wenjj8a AT 163 DOT com and the conference organizers ( tsp2015zhangjiajie AT gmail DOT com).
Homepage: https://sites.google.com/site/happywenjunjiang2012/ 
Please, accept our apologies in case of multiple copies of this CFP
Copyright @ Trusted Computing Institute, CSU


Wenjun Jiang(姜文君),
School of Information Science and Engineering, 
Hunan University, Changsha, China.
Cellphone: 18684821531
Email: wenjj8a at gmail.com; wenjj8a at 163.com; 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openmath.org/pipermail/om-announce/attachments/20150327/c2d553df/attachment-0001.html>

More information about the Om-announce mailing list