ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Reply To:
Thu, 17 Apr 2014 10:00:18 +1000
text/plain (189 lines)
Apologies if you received multiple copies of this IEEE TrustData 2014 CFPs
(Paper Submission Deadline: May 10, 2014)

Call for Papers for the 5th IEEE International Workshop on Trust, Security
and Privacy for Big Data (TrustData 2014)
Dalian, China, August 24-27, 2014

In Conjunction with

The 12th IEEE International Conference on Dependable, Autonomic and Secure
Computing (DASC 2014)
Dalian, China, August 24-27, 2014


The proliferation of new technologies such as Internet of Things and cloud
calls for innovative ideas to retrieve, filter, and integrate data from a
large number
of diverse data sources. Big Data is an emerging paradigm applied to
datasets whose
volume/velocity/variability is beyond the ability of commonly used software
tools to
manage and process the data within a tolerable period of time. More
importantly, Big
Data has to be of high value, and should be protected in an efficient way.
Since Big
Data involves a huge amount of data that is of high-dimensionality and
existing trust, security, and privacy measures for traditional databases
infrastructures cannot satisfy its requirements. Novel technologies for
protecting Big
Data are attracting researchers and practitioners with more and more

Scope and Interests

The 5th IEEE International Workshop on Trust, Security and Privacy for Big
Data (TrustData 2014)
aims to bring together people from both academia and industry to present
their most recent work
related to trust, security and privacy issues in Big Data, and exchange
ideas and thoughts in order
to identify emerging research topics and define the future of Big Data.
Topics of interest include,
but are not limited to:

Trust Track
(1) Trust semantics, metrics, and models for Big Data
(2) Trust management and evaluation for Big Data
(3) Trusted systems, software, and applications for Big Data
(4) Trusted platform implementation technologies for Big Data
(5) Information quality/trustworthiness for Big Data
(6) Provenance of content for Big Data
(7) Trustworthiness of ratings/recommender systems for Big Data

Security Track
(1) Security model and architecture for Big Data
(2) Data mining security for Big Data
(3) Software and system security for Big Data
(4) Intrusion detection for Gigabit Networks
(5) Cryptography and Big Data
(6) Visualizing large scale security data
(7) Threat detection using Big Data analytics
(8) Human computer interaction challenges for Big Data security
(9) Data protection, integrity standards and policies
(10) Security and legislative impacts for Big Data
(11) Managing user access for Big Data
(12) Secure quantum communications

Privacy Track
(1) Privacy in Big Data applications and services
(2) Privacy in Big Data end-point input validation and filtering
(3) Privacy in Big Data integration and transformation
(4) Privacy in parallel and distributed computation
(5) Privacy in Big Data storage management
(6) Privacy in Big Data access control mechanisms
(7) Privacy in Big Data mining and analytics
(8) Privacy in Big Data sharing and visualization
(9) Big Data privacy policies and standards

Submission and Publication Information

All papers need to be submitted electronically through the conference
( with PDF
The materials presented in the papers should not be published or under
elsewhere. Submit a full paper with 6 pages plus up to 2 extra pages (IEEE
Computer Society
Proceedings Manuscripts style: two columns, single-spaced), including
figures and references,
using 10 fonts, and number each page. You can confirm the IEEE Computer
Society Proceedings
Author Guidelines at the following web page:

Once accepted, the paper will be included into the IEEE conference
proceedings published by
IEEE Computer Society Press (indexed by EI). Authors (at least one) of any
accepted paper
are requested to register at the conference.

Important Dates

(1) Paper Submission Deadline:       May 10, 2014
(2) Authors Notification:            June 10, 2014
(3) Camera-Ready Paper Due:          June 30, 2014
(4) Conference Registration:         June 30, 2014
(5) Conference Dates:                August 24-27, 2014

Steering Co-Chairs

Guojun Wang, Central South University, China
Peter Mueller, IBM Zurich Research Laboratory, Switzerland

General Co-Chairs

Qin Liu, Hunan University, China
Muhammad Bashir Abdullahi, Federal University of Technology, Minna, Nigeria

Program Co-Chairs

Jin-Hee Cho, U.S. Army Research Laboratory, USA
Lizhe Wang, Chinese Academy of Sciences, China

Program Committee (In alphabetical order)

Publicity Co-Chairs

Shui Yu, Deakin University, Australia
Weirong Liu, Central South University, China


Xiangdong Lee, Central South University, China


Please email inquiries concerning TrustData 2014 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com
and the symposium organizers: TrustData2014 AT gmail DOT com

Copyright @ Trusted Computing Institute, CSU



Shui YU, PhD, Senior Lecturer

School of Information Technology, Deakin University,

221 Burwood Highway, Burwood, VIC 3125,  Australia.

Telephone:0061 3 9251 7744

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see