Track 4: Call for Paper
Recent advances in information and network technologies hasten the demand of secure processing, storing, and sharing information in IT environments. The awareness of network security and privacy should be utilized for improving the network-wised security. Security issues related to network security and privacy, such as data confidentiality, data authentication, data integrity and data freshness, which involves network modelling & optimisation, system security and analysis, integration/embedding security, cryptographic protocols, user authentication, secure data transmission (e.g. covert communications), etc. Researchers and engineers are invited to interact and disseminate information on the latest developments in network security and privacy.
Research papers are invited on any aspect of information security and privacy to be presented at the 2015 IEEE International Conference on Autonomic and Trusted Computing. ATC 2015 solicits original, unpublished contributions in all aspects of information security and privacy. Works validated by experimentation, simulation or analysis are particularly encouraged. Practical experiences and experimental works from both industry and academia are also welcome. Submitted manuscripts should be written in English and must not be concurrently considered elsewhere for publication. The conference provides authors with an outstanding opportunity for networking and presenting their latest work at an international conference.
Suggested topics on Network Security and Privacy (other topics are also welcome):
- Security Frameworks, Architectures and Protocols
- Cryptographic Algorithms and Security Protocols
- Information Hiding and Anonymity
- Vulnerability Analysis and Countermeasures
- Database Security and Middleware Security
- Security Architecture and Design Analysis
- Data Fraud and Data Fabrication
- Privacy-Enhancing Models and Technologies
- Network Security Deployment and Management
- Privacy In Cloud and Pervasive Computing
- Authentication, Privacy and Security Models
- GPS-based security and Security Location-based Services
- Mobile Sensing and Sensor Networks
- Bluetooth and RFID Security
- Privacy in Wireless Communications and Mobile Security Applications
- Security and Trust in Pervasive Information Systems
- Privacy-Preserving Protocols
- Vehicular Systems and Networks
- Secure Routing and Access Control
- Software Vulnerabilities
- Computational Models of Trust