Call for Papers

IEEE Transactions on Reliability Special Section on Trustworthy Computing


Background

Trustworthy Computing (TC) has been applied to software-enabled computing systems and networks that are inherently secure, private, available, and reliable. As the fast growing mobile cloud computing emerges to cover smart phones, tablets, smart TV, and cloud computing platforms, these ubiquitous computing devices poses new challenges to trustworthy computing. Cloud computing offers organizations of all sizes the ability to embrace and implement new applications at far less cost than traditional approaches. Organizations that move workloads to the cloud take advantage of the capabilities of their cloud providers to ensure continuous availability of services. However, the ever-growing complexity of such systems and the software that controls them not only makes it much more difficult to guarantee their quality, but also introduces more vulnerability for malicious attacks, intrusion, and data loss.

To address these needs, this special section calls for novel applications of emerging techniques for trustworthy computing of information, software, systems, networks. Reviews and case studies which address state-of-art research and state-of-practice industry experiences are also welcomed.


Topics

he topics of interest include, but are not limited to:

  • Security, reliability, privacy, and availability issues in computing systems and networks;
  • Trustworthy computing in small or large systems, such as mobile devices, embedded systems, cloud computing platforms, and internet of things;
  • Information, system, and software assurance;
  • Auditing, verification, validation,
  • security testing, evaluation, and measurement;
  • Data protection, maintenance, recovery, and risk assessment ;
  • Authentication, authorization, access control, and accounting;
  • penetration analysis, intrusion detection and prevention,;
  • Malware behavior analysis, and software vulnerability discovery;
  • Hardware techniques facilitating trustworthy computing, such as Trusted Platform Module (TPM);
  • Trustworthy operating systems and applications;
  • Cloud Computing
  • Mobile Computing
  • Software defined networking (SDN)
  • Cryptographic techniques.

Submission Information

We welcome high quality submissions that are original work, not published or currently submitted elsewhere. We also encourage significant extensions to conference papers, as long as the submitted paper is fully new. Submit manuscripts directly to the Managing Editor. We accept only electronic submissions, so email is the preferred method. Submit your original pdf or doc(x) file to jrupe@ieee.org, indicating your submission to this special section by its title.


Important Dates

Nov. 1, 2013 Paper submission deadline
Apr. 1, 2014 First round notification
June 1, 2014 Revised submission deadline
Oct. 1, 2014 Final notification


Guest Editor: Shiuhpyng Winston Shieh, Dept. of Computer Science, National Chiao Tung University, ssp@cs.nctu.edu.tw