As we see the proliferation of the information industry and the widespread use of information technology, security has been cited as a major concern in our society. In particular, with the rapid development of the latest information technologies and systems such as cloud computing, big data, Internet of Things and social networks, data is shared more ubiquitously and perceived more intelligently; thus security issues have become more serious.
Fundamental security issues include data confidentiality, information privacy, data integrity, data traceability and service availability, etc. Trusted computing and other information security technologies such as cryptography, network security, content security, privacy protection and disaster recovery need to be integrated to solve the security issues mentioned above.
This special issue aims to provide a forum for researchers, practitioners, developers and users in trusted
computing and information security areas to explore cutting-edge ideas and techniques, and to exchange solutions, tools, experiences and results.
The issue will carry revised and substantially extended versions of selected papers presented at the8th Chinese Conference on Trusted Computing and Information Security (CTCIS 2014), but we also encourage researchers unable to participate in the conferences to submit articles for this call.
Suitable topics include, but are not limited to, the following:
- Theory and technology of trusted computing
- Cryptography and cryptanalysis
- Network and communication security
- Content security for multimedia
- Fault tolerance and disaster recovery
- Security in cloud computing
- Big data security
- Privacy in internet of things
- Privacy in social networks
Important Dates
Submission of manuscripts: 20 September, 2014
Notification to authors: 20 November, 2014
Final versions due: 20 January, 2015
No comments:
Post a Comment