Second International Workshop on Trust and Privacy in Cyberspace (CyberTrust'14)
13-14 March 2014, Trivandrum, India
http://www.iiitmk.ac.in/snds/cybertrust2014.html
Traditional security mechanisms typically protect resources from malicious users, by restricting access to only authorized users. In many situations we have to protect ourselves from those who offer resources/services so that the problem in fact is reversed. For example, information providers can act deceitfully by providing false or misleading information. Malicious or improper usages like the above attacks cannot be addressed by traditional security solutions. These issues relate more with trustworthiness rather than security. In distributed, open systems, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is widely used. At the same time, the privacy is also of prime importance while communicating over publicly spanned network like web. A service provider as well as service requester or consumer must be allowed to define and enforce privacy policies to protect sensitive information like personal information, credit history of a customer or some confidential data etc. The International Workshop on Trust and Privacy in Cyberspace (CyberTrust'14) aims to establish a state of the art for trust management and privacy protection, and to provide a forum for exchange of ideas among researchers working on these areas.
Call for Papers
CyberTrust'14 invites original and unpublished work from individuals active in the broad theme of the Workshop.The maximum length of the paper is 10 pages (including figures and references). The paper should not contain page numbers or any special headers or footers. The manuscripts should be submitted in PDF format. Authors should submit their papers online. Unregistered authors should first create an account on EDAS to log on.
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.
Topics of interest include, but are not limited to, the following:
- Architecture of interoperable/open source systems
- Bio-inspired, distributed/dynamic trust management
- Collaborative computing applications, critical infrastructure protection
- E-governance, e-learning, electronic knowledge transfer, e-commerce
- Ethics, sociology, psychology
- Group communication systems, mobile/wireless communications, sensor networks
- Identity management and pseudonymity
- Legal/economic aspects
- Measurement study for understanding web security and privacy
- Models, formalization, specification, analysis, reasoning
- Multimedia information management, service-oriented computing
- P2P, grid, cloud and clusters
- Pervasive computational trust, use of context-awareness
- Security and privacy as a service
- Security and privacy policies for composable content
- Small-world/social networks
- Smart grid and virtual organisations
- Trust self-organisation and autonomic networks
- Trusted Software
- Usable security and privacy
Technical Program Committee
Workshop and Special Session Chair
Ping Yang, State University of New York at Binghamton, USA
Program Chair
Ashok Kumar Das, IIIT Hyderabad, India
TPC Members
- Rakesh Bobba, University of Illinois at Urbana-Champaign, USA
- Benoit Hudzia, SAP Research, United Kingdom
- Chang Wu Yu, Chung Hua University, Taiwan
- Darshan Shinde, University At Albany, USA
- Deepak Garg, Thapar University, Patiala, India
- Fangyang Shen, New York City College of Technology (CUNY), USA
- Ghassan Karame, NEC Laboratories Europe, Germany
- Guangzhi Qu, Oakland University, USA
- Hamed Okhravi, MIT Lincoln Laboratory, USA
- Helge Janicke, De Montfort University, United Kingdom
- Houcine Hassan, Universidad Politecnica de Valencia, Spain
- Jiping Xiong, Zhejiang Normal University, P.R. China
- Juan-Carlos Cano, Universidad Politecnica de Valencia, Spain
- Marjan Naderan, Shahid Chamran University of Ahwaz, Iran
- Mohamed-Ali Kaafar, INRIA France, France
- Phan Cong-Vinh, NTT University, Vietnam
- Suzanne McIntosh, Cloudera, USA
Key Dates
Full Paper Submission Ends | November 25, 2013 EST |
Acceptance Notification | December 15, 2013 |
Final paper Deadline | December 31, 2013 |
Author Registration Closes | January 5, 2014 |
Conference | March 13 -14, 2014 |
Contact Us
Email: snds2014.iiitmk@gmail.com