Scope and Topics

 

IEEE TrustCom-17 is an international conference for presenting and discussing emerging ideas and trends in trusted computing and communications in computer systems and networks from both the research community as well as the industry. Topics of interest include, but are not limited to:

Trust Track

  • Trust semantics, metrics and models
  • Trusted computing platform
  • Trusted network computing
  • Trusted operating systems
  • Trusted software and applications
  • Trust in social networks
  • Trust in e-commerce and e-government
  • Trust in mobile and wireless communications
  • Risk and reputation management
  • Survivable computer systems/networks
  • Trust in 5G networks
  • Miscellaneous trust issues in  cyber Security

Security Track

  • Network and Cyber security
  • Computer security
  • Database security
  • Web applications security
  • Security policy, model and architecture
  • Security in social networks
  • Security in parallel and distributed systems
  • Security in mobile and wireless communications
  • Security in cloud/pervasive computing
  • Authentication, authorization and accounting
  • Security of 5G Networks
  • Miscellaneous security issues

Privacy Track

  • Privacy in Web-based applications and services
  • Privacy in database systems
  • Privacy in parallel and distributed systems
  • Privacy in cloud/pervasive computing
  • Privacy in mobile and wireless communications
  • Privacy in e-commerce and e-government
  • Privacy in network deployment and management
  • Privacy and trust
  • Privacy and security
  • Privacy and anonymity
  • Privacy preservation in 5G
  • Miscellaneous privacy issues

Forensics and Analytics Track

  • Anti-forensics
  • Biometrics
  • Cryptanalysis
  • Cyber Analytics
  • Big data forensics
  • CCTV forensics
  • Cloud forensics
  • Computational forensics
  • Cyber-physical system forensics
  • Datamining for forensics
  • Facial recognition 
  • Fingerprint forensics
  • Image forensics
  • Malware forensics
  • Mobile app forensics (e.g. Skype, WeChat and Facebook)
  • Mobile device forensics
  • Multimedia forensics
  • Network forensics
  • Steganography and steganalysis
  • System reverse engineering
  • Watermarking