Call for Papers

IEEE Transactions on Reliability Special Section on Trustworthy Computing


Trustworthy Computing (TC) has been applied to software-enabled computing systems and networks that are inherently secure, private, available, and reliable. As the fast growing mobile cloud computing emerges to cover smart phones, tablets, smart TV, and cloud computing platforms, these ubiquitous computing devices poses new challenges to trustworthy computing. Cloud computing offers organizations of all sizes the ability to embrace and implement new applications at far less cost than traditional approaches. Organizations that move workloads to the cloud take advantage of the capabilities of their cloud providers to ensure continuous availability of services. However, the ever-growing complexity of such systems and the software that controls them not only makes it much more difficult to guarantee their quality, but also introduces more vulnerability for malicious attacks, intrusion, and data loss.

To address these needs, this special section calls for novel applications of emerging techniques for trustworthy computing of information, software, systems, networks. Reviews and case studies which address state-of-art research and state-of-practice industry experiences are also welcomed.


The topics of interest include, but are not limited to:

  • Security, reliability, privacy, and availability issues in computing systems and networks;
  • Trustworthy computing in small or large systems, such as mobile devices, embedded systems, cloud computing platforms, and internet of things;
  • Information, system, and software assurance;
  • Auditing, verification, validation,
  • security testing, evaluation, and measurement;
  • Data protection, maintenance, recovery, and risk assessment ;
  • Authentication, authorization, access control, and accounting;
  • penetration analysis, intrusion detection and prevention,;
  • Malware behavior analysis, and software vulnerability discovery;
  • Hardware techniques facilitating trustworthy computing, such as Trusted Platform Module (TPM);
  • Trustworthy operating systems and applications;
  • Cloud Computing
  • Mobile Computing
  • Software defined networking (SDN)
  • Cryptographic techniques.

Submission Information

We welcome high quality submissions that are original work, not published or currently submitted elsewhere. We also encourage significant extensions to conference papers, as long as the submitted paper is fully new. Information for authors can be found at A single column, double space submission is preferred, and its page limit is flexible. However, we expect that the manuscript length is approximately equivalent to 10 pages of a two column, single space paper. We accept only electronic submissions, so email is the preferred method. Submit your original pdf or doc(x) file to Managing Editor: Jason W. Rupe, indicating your submission to this special section by its title.

Important Dates

November 1, 2013 Paper submission deadline

Guest Editor: Shiuhpyng Winston Shieh, Dept. of Computer Science, National Chiao Tung University,