Call for Papers for the Sixth IEEE/IFIP International

Symposium on Trusted Computing and Communications



Organizer: Trusted Computing Institute, Central South University, China

Venue & Dates: Hong Kong SAR, China, December 11-13, 2010

To be held in conjunction with

The Eighth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-10)



With the rapid development and the increasing complexity of computer and communications systems and networks, traditional security technologies and measures can not meet the demand for integrated and dynamic security solutions. As a challenging and innovative research field, trusted computing and communications target computer and communications systems and networks that are available, secure, reliable, controllable, dependable, and so on. In a word, they must be trustworthy. If we view the traditional security as identity trust, the broader field of trusted computing and communications also includes behavior trust of systems and networks. In fact, trusted computing and communications have become essential components of various distributed services, applications, and systems, including ad-hoc networks, peer-to-peer networks, social networks, semantic webs, e-commence, e-government, pervasive, ubiquitous, and cyber-physical systems.


The Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10) will be held in conjunction with "The Eighth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-10)". It follows the success of TrustCom-09 in Vancouver, Canada, TrustCom-08 in Zhangjiajie, China, SNDS-07 in Niagara Falls, Canada, SNDS-06 in Vienna, Austria, and SNDS-05 in Fukuoka, Japan. It aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to security, safety, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.


Scope and Interests

TrustCom-10 is an international forum for presenting and discussing emerging ideas and trends in trusted computing and communications in computer systems and networks from both the research community as well as the industry. Topics of interest include, but are not limited to:

(1) Trust semantics, metrics, and models

(2) Trust inference, computation, and combination

(3) Trusted computing platform

(4) Trusted network computing

(5) Trusted operating systems

(6) Trusted software

(7) Trusted database

(8) Trusted services and applications

(9) Trusted communications

(10) Trust in e-commerce and e-government

(11) Trust in mobile and wireless networks

(12) Reliable and fault-tolerant computer systems/networks

(13) Survivable computer systems/networks

(14) Cryptography and security protocols

(15) Authentication in computer systems/networks

(16) Access control in computer systems/networks

(17) Key management in computer systems/networks

(18) Anonymity and privacy in computer systems/networks

(19) Trust in emerging applications

(20) Miscellaneous trust issues


Submission and Publication Information

The accepted papers from this symposium will be published by IEEE Computer Society in IEEE EUC-10 proceedings (indexed by EI Compendex and ISTP). Papers should be written in English conforming to the IEEE standard conference format(8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the symposium website. Manuscripts should be submitted through the paper submission system at the symposium website. Each paper is limited to 6 pages (or 8 pages with the over length charge). Distinguished papers, after further revisions, will be published in two special issues: (1) Elsevier's Computer and Communications (COMCOM); (2) IEICE’s Transactions on Information and Systems, both to be indexed by SCI and EI. The program committee will select one winner for the Best Paper Award for this symposium. Submitting a paper to the symposium means that, if the paper is accepted, at least one author should attend the symposium and present the paper. For no-show authors, their papers will be removed from the digital library after the symposium and their affiliations will be notified.

Past Special Issues:

TrustCom 2009 SI: Elsevier’s Journal of Network and Computer Applications (JNCA), both SCI and EI indexed.

TrustCom 2008 SI: Wiley’s Security and Communication Networks (SCN), both SCI and EI indexed.

Important Dates

(1)  Paper submission due:               July 9, 2010 (Extended to 31 July, 2010, Firm Deadline)

(2)  Notification of decision:             September 20, 2010

(3)  Camera-ready papers due:          October 22, 2010 


General Co-Chairs

Jie Wu, Temple University, USA

Srinivas Sampalli, Dalhousie University, Canada

Program Co-Chairs

Helen Y. Tang, Defence Research & Development Canada–Ottawa, Canada

Xinwen Fu, University of Massachusetts Lowell, USA


Program Committee (in alphabetical order)

Adel Cherif, Qatar University, Qatar

Akashi Aggarwal, University of Windsor, Canada

Avinash Srinivasan, Bloomsburg University, USA

Benjamin Fabian, Humboldt-Universit?t, zu Berlin, Germany

Bin Lu, West Chester University of Pennsylvania, USA

Bin Tang, Wichita State University, USA

Bin Xiao, Hong Kong Polytechnic University, Hong Kong

Chin-Tser Huang, University of South Carolina, USA

Christian Callegari, University of Pisa, Italy

Cliff Zou, University of Central Florida, USA

Constantinos Lambrinoudakis, University of Piraeus, Greece

David Chadwick, University of Kent, UK

Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China

Dong Seong Kim, Duke University, USA

Dong Xiang, Tsinghua University, China

El-Sayed El-Alfy, King Fahd University of Petroleum and Minerals, Saudi Arabia

Emmanuelle Anceaume, IRISA, France

Fang Qi, Central South University, China

Farid Na?t-Abdesselam, University of Lille, France

Gang Li, Institute of Computing Technology, Chinese Academy of Sciences, China

Gaocai Wang, Hunan University, China

Gianluigi Me, University of Rome "Tor Vergata", Italy

Gregorio Martinez, University of Murcia (UMU), Spain

Hai Jiang, Arkansas State University, USA

Ioannis Broustis, Alcatel-Lucent, USA

Jean-Marc Seigneur, University of Geneva, Switzerland

Jemal Abawajy, Deakin University, Australia

Jian Ren, Michigan State University East Lansing, USA

Jian Yu, University of Adelaide, Australia

Jianxun Liu, Hunan University of Science and Technology, China

Jin-Hee Cho, U.S. Army Research Laboratory, USA

Jinhua Xiong, Institute of Computing Technology, Chinese Academy of Sciences, China

Jinzhao Wu, Beijing Jiaotong University, China

Jun Shen, University of Wollongong, Australia

Justin Zhan, Carnegie Mellon CyLab, Japan

Kaiqi Xiong, North Carolina State University, USA

Kenji Saito, Keio University, Japan

Khaled Salah, King Fahd University of Petroleum & Minerals, Saudi Arabia

Maoyu Wang, Communication Research Center Canada, Canada

Marco Aiello, University of Groningen, The Netherlands

Marten J. Van Sinderen, Universty of Twente, The Netherlands

Meng Yu, Western Illinois University, USA

Mohamed Hamdi, University of Carthage, Tunisia

Mohamed Moustafa, Akhbar El Yom Academy, Egypt

N. Jaisankar, VIT University, India

Nan Zhang, George Washington University, USA

Nicolas Sklavos, Technological Educational Institute of Patras, Greece

Paolo Falcarin, Politecnico di Torino, Italy

Peter Bertok, RMIT University, Australia

Qiang Ye, University of Prince Edward Island, Canada

Qijun Gu, Texas State University at San Marcos, USA

Rajendra V. Boppana, University of Texas, USA

Rajiv Bagai, Wichita State University, USA

Richard Yu, Carleton University, Canada

Ruixuan Li, Huazhong University of Science and Technology, China

Sajid Hussain, Fisk University, USA

Sanjeev Kumar, University of Texas - Pan American, USA

Song Han, Curtin University of Technology, Australia

Steve Graham, Dakota State University, USA

Suthikshn Kumar, PES Institute of Technology, India

Wei Jie, University of Manchester, UK

Wei Yu, Towson University, USA

Weigang Wu, Sun Yat-Sen University, China

Xiaolei Dong, Shanghai Jiao Tong University, China

Xiangyang Li, Illinois Institute of Technology, USA

Yafei Yang, Qualcomm Inc., USA

Yan Zhang, Simula Research Laboratory, Norway

Yanjiang Yang, Institute for Infocomm Research, Singapore

Yeong-Deog Kim, Woosong University, Korea

Yi Mu, University of Wollongong, Australia

Yihui Tang, MicroStrategy Inc., USA

Yingying Chen, Stevens Institute of Technology, USA

Yong Zhang, Liaoning Normal University, China

Young-Sik Jeong, WonKwang University, Korea

Yu Chen, State University of New York, USA

Zhe Tang, Central South University, China

Zhiquan (George) Zhou, University of Wollongoong, Australia

Zili Shao, Hong Kong Polytechnic University, Hong Kong


Steering Committee

Guojun Wang, Central South University, China (Chair)

Laurence T. Yang, St. Francis Xavier University, Canada (Chair)

Hsiao-Hwa Chen, National Cheng Kung University, Taiwan

Jiannong Cao, Hong Kong Polytechnic University, Hong Kong

Jie Wu, Temple University, USA

Kouichi Sakurai, Kyushu University, Japan

Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain

Minyi Guo, Shanghai Jiao Tong University, China

Peter Mueller, IBM Zurich Research Laboratory, Switzerland

Weijia Jia, City University of Hong Kong, Hong Kong


Publicity Co-Chairs

Alberto Sanchez, Universidad Rey Juan Carlos, Madrid, Spain

Guang Gong, University of Waterloo, Canada

Hamid Mehrvar, Nortel, Canada

Hejun Wu, Sun Yat-Sen University, China

Matthew Wright, University of Texas at Arlington, USA

Shuhui Yang, Purdue University Calumet, USA



Feng Yan, Central South University, China



Qiushuang Du, Central South University, China




Please email inquiries concerning TrustCom 2010 to:

Prof. Guojun Wang: csgjwang AT gmail DOT com



Copyright © Trusted Computing Institute, CSU