Call for Papers
Background Trustworthy Computing (TC) has been applied to software-enabled computing systems and networks that are inherently secure, private, available, and reliable. As the fast growing mobile cloud computing emerges to cover smart phones, tablets, smart TV, and cloud computing platforms, these ubiquitous computing devices poses new challenges to trustworthy computing. Cloud computing offers organizations of all sizes the ability to embrace and implement new applications at far less cost than traditional approaches. Organizations that move workloads to the cloud take advantage of the capabilities of their cloud providers to ensure continuous availability of services. However, the ever-growing complexity of such systems and the software that controls them not only makes it much more difficult to guarantee their quality, but also introduces more vulnerability for malicious attacks, intrusion, and data loss. To address these needs, this special section calls for novel applications of emerging techniques for trustworthy computing of information, software, systems, networks. Reviews and case studies which address state-of-art research and state-of-practice industry experiences are also welcomed. Topics he topics of interest include, but are not limited to:
Submission Information We welcome high quality submissions that are original work, not published or currently submitted elsewhere. We also encourage significant extensions to conference papers, as long as the submitted paper is fully new. Submit manuscripts directly to the Managing Editor. We accept only electronic submissions, so email is the preferred method. Submit your original pdf or doc(x) file to jrupe@ieee.org, indicating your submission to this special section by its title. Important Dates
Guest Editor: Shiuhpyng Winston Shieh, Dept. of Computer Science, National Chiao Tung University, ssp@cs.nctu.edu.tw |
|||||||||||||||||||||||||||