| |||||||||||||||
TrustData 2013 : the 2013 International Workshop on Trust, Security and Privacy for Big Data | |||||||||||||||
Link: http://trust.csu.edu.cn/conference/TrustData2013 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Introduction
The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative ideas to retrieve, filter, and integrate data from a large number of diverse data sources. Big Data is an emerging paradigm applied to datasets whose volume/velocity/variability is beyond the ability of commonly used software tools to manage and process the data within a tolerable period of time. More importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust, security, and privacy measures for traditional databases and infrastructures cannot satisfy its requirements. Novel technologies for protecting Big Data are attracting researchers and practitioners with more and more attention. Scope and Interests The 2013 International Workshop on Trust, Security and Privacy for Big Data (TrustData-13) aims to bring together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data. Topics of interest include, but are not limited to: Trust Track (1) Trust semantics, metrics, and models for Big Data (2) Trust management and evaluation for Big Data (3) Trusted systems, software, and applications for Big Data (4) Trusted platform implementation technologies for Big Data (5) Information quality/trustworthiness for Big Data (6) Provenance of content for Big Data (7) Trustworthiness of ratings/recommender systems for Big Data Security Track (1) Security model and architecture for Big Data (2) Data mining security for Big Data (3) Software and system security for Big Data (4) Intrusion detection for Gigabit Networks (5) Cryptography and Big Data (6) Visualizing large scale security data (7) Threat detection using Big Data analytics (8) Human computer interaction challenges for Big Data security (9) Data protection, integrity standards and policies (10) Security and legislative impacts for Big Data (11) Managing user access for Big Data Privacy Track (1) Privacy in Big Data applications and services (2) Privacy in Big Data end-point input validation and filtering (3) Privacy in Big Data integration and transformation (4) Privacy in parallel and distributed computation (5) Privacy in Big Data storage management (6) Privacy in Big Data access control mechanisms (7) Privacy in Big Data mining and analytics (8) Privacy in Big Data sharing and visualization (9) Big Data privacy policies and standards Submission and Publication Information The accepted papers from this workshop will be published by Springer Lecture Notes in Computer Science (EI indexed). Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages (or 14 pages with the over length charge), including tables, figures, references and appendixes, in Springer LNCS Format with Portable Document Format (.pdf). Please submit your paper at https://www.easychair.org/conferences/?conf=trustdata2013. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the workshop, authors assure that if the paper is accepted, at least one author will attend the workshop and present the paper. For no-show authors, their papers will be removed from the digital library after the workshop and their affiliations will be notified. Important Dates (1) Paper Submission Deadline: June 15, 2013 (2) Authors Notification: August 15, 2013 (3) Camera-Ready Paper Due: September 15, 2013 (4) Conference Dates: November 13-15, 2013 General Co-Chairs Guojun Wang, Central South University, China Jin-Hee Cho, U.S. Army Research Laboratory, USA Lizhe Wang, Chinese Academy of Sciences, China Program Co-Chairs Qin Liu, Central South University, China Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria Yongming Xie, Guangzhou University, China Program Committee (In alphabetical order) http://trust.csu.edu.cn/conference/TrustData2013 Publicity Co-Chairs Zheng Yan, Xidian University, China/Aalto University, Finland Peter Mueller, IBM Zurich Research Laboratory, Switzerland Weirong Liu, Central South University, China Webmaster Jie Wang, Central South University, China Contact Please email inquiries concerning TrustData 2013 to: Prof. Guojun Wang: csgjwang AT gmail DOT com and the symposium organizers: trustdata2013 AT gmail DOT com Copyright @ Trusted Computing Institute, CSU http://trust.csu.edu.cn/ |
|