Trustworthy Computing (TC) aims at providing secure, private, and reliable computing experiences in a world where computing has become a necessity for many aspects of life. While decades has passed since the concept of trustworthy computing was introduced for military, financial, and public safety related computing systems, trustworthy computing still remains one of the key issues in the design and operation of computing systems nowadays. The ever-growing complexity of computing systems, the shift of trust to a third-party cloud service provider, and the widespread use of computing devices have made it much more difficult to implement trustworthy computing. In view of the challenges, the TC workshop is formed in conjunction with QRS 2016 to call for innovative work on the design and application of trustworthy computing. Reviews and case studies which address state-of-art research and state-of-practice industry experiences are also welcomed.
Topics include, but are not limited to:
Policies and models of trustworthy computing
Security, reliability, and availability issues in computing systems and networks
Censorship, anonymity, and privacy issues
Trustworthy mobile and cloud computing
Smart grid, SCADA, and critical information infrastructure
The implication of Internet of Things on trustworthy computing
Online social network and human factor issues
Effective security protection and management of big data
Industrial control devices, portable devices and applications
Hardware support for trustworthy computing
Detection, prevention, and response to malware and security attacks
Information, system, and software assurance
Auditing, verification, and validation
Security testing, evaluation, and measurement
Data protection, maintenance, recovery, and risk assessment
Authentication, authorization, access control, and accounting
Software defined networking (SDN)
Cryptographic techniques
08月01日
2016
08月03日
2016
摘要截稿日期
摘要录用通知日期
注册截止日期
2017年07月25日 捷克共和国 Prague
2017 IEEE国际可信计算研讨会2015年08月03日 加拿大
2015IEEE国际可信计算研讨会
留言