<html><body><div style="color:#000; background-color:#fff; font-family:times new roman, new york, times, serif;font-size:12pt"><div>Please accept our apologies if you received multiple copies.<br></div><div style="font-size: 12pt; font-family: 'times new roman', 'new york', times, serif; "><div style="font-size: 12pt; font-family: 'times new roman', 'new york', times, serif; "><div id="yiv1271100930"><div style="color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-size: 12pt; font-family: 'times new roman', 'new york', times, serif; "><div><div><br></div><div>---------------------------------------------------------------------------------</div><div>NEWS</div><div><br></div><div>2011.06.30: The paper submission deadline has been extended to July 20, 2011</div><div>(Extended Firm Deadline).</div><div><br></div><div>2011.06.15: The program committee (PC members) have been
built. </div><div>http://trust.csu.edu.cn/conference/trustcom2011/ProgramCommittee/</div><div><br></div><div>2011.06.14: The conference registration has been opened. </div><div>http://trust.csu.edu.cn/conference/trustcom2011/registration/</div><div><br></div><div>2011.06.10: The keynote information is
available. </div><div>http://trust.csu.edu.cn/conference/trustcom2011/keynote/</div><div><br></div><div>2011.06.01: The travel guide is available. </div><div>http://trust.csu.edu.cn/conference/trustcom2011/travel/</div><div><br></div><div>2011.05.20: The paper submission system has been opened. </div><div>http://trust.csu.edu.cn/conference/trustcom2011/submission/</div><div><br></div><div>2010.11.11: The IEEE TrustCom-11 website has been opened.</div><div>---------------------------------------------------------------------------------</div><div><br></div><div>Call for Papers</div><div><br></div><div>The main conference:</div><div><br></div><div>The 10th IEEE International Conference on Trust, Security and Privacy </div><div>in Computing and Communications (IEEE TrustCom 2011)</div><div>http://trust.csu.edu.cn/conference/TrustCom2011/</div><div><br></div><div>7 symposiums/workshops in conjunction with TrustCom
2011:</div><div><br></div><div>UbiSafe 2011, ISSR 2011, SPIoT 2011, ACS 2011, TrustID 2011,</div><div>SQC 2011, and TSCloud 2011. See "Symposiums/Workshops" at:</div><div>http://trust.csu.edu.cn/conference/trustcom2011/</div><div><br></div><div><br></div><div>Organizers: </div><div>School of Information Science and Engineering </div><div>& School of Software, Central South University, China</div><div>Venue & Dates: Changsha, China, November 16-18, 2011</div><div><br></div><div><br></div><div>Introduction</div><div><br></div><div>With rapid development and increasing complexity of computer and </div><div>communications systems and networks, user requirements for trust, </div><div>security and privacy are becoming more and more demanding. However,</div><div>there is a grand challenge that traditional security technologies and</div><div>measures may not meet user requirements in open, dynamic, </div><div>heterogeneous,
mobile, wireless, and distributed computing</div><div>environments. Therefore, we need to build systems and networks in</div><div>which various applications allow users to enjoy more comprehensive</div><div>services while preserving trust, security and privacy at the same </div><div>time. As useful and innovative technologies, trusted computing and </div><div>communications are attracting researchers with more and more </div><div>attention. </div><div><br></div><div>The 10th IEEE International Conference on Trust, Security and Privacy</div><div>in Computing and Communications (IEEE TrustCom-11) will be held in </div><div>Changsha, China in November 16-18, 2011. It results from merging two </div><div>conference series: TrustCom (International Symposium on Trusted </div><div>Computing and Communications) and TSP (International Symposium on </div><div>Trust, Security and Privacy for Emerging Applications). It
follows </div><div>the success of TrustCom-10 in Hong Kong SAR, China, and TSP-10 in </div><div>Bradford, UK. The conference aims at bringing together researchers</div><div>and practitioners in the world working on trusted computing and </div><div>communications, with regard to trust, security, privacy, reliability,</div><div>dependability, survivability, availability, and fault tolerance </div><div>aspects of computer systems and networks, and providing a forum to </div><div>present and discuss emerging ideas and trends in this highly </div><div>challenging research field.</div><div><br></div><div><br></div><div>Scope and Interests</div><div><br></div><div>IEEE TrustCom-11 is an international conference for presenting and </div><div>discussing emerging ideas and trends in trusted computing and </div><div>communications in computer systems and networks from both the </div><div>research community as well as
the industry. Topics of interest </div><div>include, but are not limited to:</div><div><br></div><div>Trust Track</div><div>Chairs: Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China</div><div> Indrajit Ray, Colorado State University, USA</div><div>(1) Trust semantics, metrics and models</div><div>(2) Trusted computing platform</div><div>(3) Trusted network computing</div><div>(4) Trusted operating systems</div><div>(5) Trusted software and applications</div><div>(6) Trust in social networks</div><div>(7) Trust in e-commerce and e-government</div><div>(8) Trust in mobile and wireless communications</div><div>(9) Risk and reputation management</div><div>(10) Survivable computer systems/networks</div><div>(11) Miscellaneous trust issues </div><div><br></div><div>Security Track</div><div>Chairs: Liqun Chen, HP Labs in Bristol, UK</div><div> Guilin Wang, University of
Wollongong, Australia</div><div>(1) Network security</div><div>(2) Computer security</div><div>(3) Database security</div><div>(4) Web applications security</div><div>(5) Security policy, model and architecture</div><div>(6) Security in social networks</div><div>(7) Security in parallel and distributed systems</div><div>(8) Security in mobile and wireless communications</div><div>(9) Security in grid/cloud/pervasive computing</div><div>(10) Authentication, authorization and accounting</div><div>(11) Miscellaneous security issues </div><div><br></div><div>Privacy Track</div><div>Chairs: Hua Wang, The University of Southern Queensland, Australia</div><div> Christoph Sorge, University of Paderborn, Germany</div><div>(1) Privacy in Web-based applications and services</div><div>(2) Privacy in database systems</div><div>(3) Privacy in parallel and distributed systems</div><div>(4) Privacy in grid/cloud/pervasive
computing</div><div>(5) Privacy in mobile and wireless communications</div><div>(6) Privacy in e-commerce and e-government</div><div>(7) Privacy in network deployment and management</div><div>(8) Privacy and trust</div><div>(9) Privacy and security</div><div>(10) Privacy and anonymity</div><div>(11) Miscellaneous privacy issues </div><div><br></div><div><br></div><div>Submission and Publication Information</div><div><br></div><div>The accepted papers from this conference will be published by IEEE </div><div>Computer Society in IEEE proceedings (indexed by EI Compendex and </div><div>ISTP). Papers should be written in English conforming to the IEEE </div><div>standard conference format (8.5" x 11", Two-Column). Papers should be</div><div>submitted through the paper submission system at the conference </div><div>website. Each paper is limited to 8 pages (or 12 pages with the over </div><div>length charge). Distinguished
papers, after further revisions, will </div><div>be published in two special issues: (1) Elsevier's Journal of Computer </div><div>and System Sciences (JCSS); (2) Wiley's Security and Communication </div><div>Networks (SCN), both to be indexed by SCI and EI. The program committee </div><div>will select two winners for the Best Paper Awards for this conference. </div><div>Submitting a paper to the conference means that, if the paper is </div><div>accepted, at least one author should attend the conference and present </div><div>the paper. For no-show authors, their papers will be removed from the </div><div>digital library after the conference and their affiliations will be </div><div>notified.</div><div><br></div><div><br></div><div>Important Dates</div><div><br></div><div>(1) Paper submission due: July 20, 2011 (Extended Firm Deadline) </div><div>(2)
Notification of decision: August 30, 2011 </div><div>(3) Camera-ready papers due: September 30, 2011</div><div> </div><div><br></div><div>Honorary Chair</div><div><br></div><div>Lijian Tao, Vice President of Central South University, China </div><div><br></div><div><br></div><div>Steering Co-Chairs</div><div><br></div><div>Guojun Wang, Central South University, China </div><div>Laurence T. Yang, St. Francis Xavier University, Canada </div><div><br></div><div><br></div><div>General Co-Chairs</div><div><br></div><div>Yi Mu, University of Wollongong, Australia</div><div>Gregorio Martinez, University of Murcia, Spain</div><div>Geyong Min, University of Bradford, UK </div><div><br></div><div><br></div><div>Program Co-Chairs</div><div><br></div><div>Huaimin Wang, National University of Defense Technology, China</div><div>Stephen R. Tate, University of North Carolina at
Greensboro, USA</div><div>Yang Xiang, Deakin University, Australia</div><div><br></div><div><br></div><div>Program Vice Chairs</div><div><br></div><div>Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China</div><div>Indrajit Ray, Colorado State University, USA</div><div>Liqun Chen, HP Labs in Bristol, UK</div><div>Guilin Wang, University of Wollongong, Australia</div><div>Hua Wang, The University of Southern Queensland, Australia</div><div>Christoph Sorge, University of Paderborn, Germany </div><div><br></div><div><br></div><div>Program Committee</div><div><br></div><div>http://trust.csu.edu.cn/conference/trustcom2011/ProgramCommittee/</div><div><br></div><div><br></div><div>Workshop Co-Chairs</div><div><br></div><div>Yixin Jiang, Tsinghua University, China</div><div>John Fiore, Temple University, USA</div><div>Zheng Yan, Nokia Research Center, Finland </div><div><br></div><div><br></div><div>Organizing
Co-Chairs</div><div><br></div><div>Zhigang Chen, Central South University, China</div><div>Ming Xu, National University of Defense Technology, China</div><div>Edwin Sha, Hunan University, China/The University of Texas at Dallas, USA </div><div><br></div><div><br></div><div>Publicity Co-Chairs</div><div><br></div><div>Scott Fowler, Linkoping University, Sweden </div><div>Felix Gomez Marmol, NEC Laboratories Europe, Germany </div><div>Jianliang Gao, University of Ulster, UK </div><div>Jose Maria Alcaraz Calero, Hewlett-Packard Laboratories, UK </div><div>Jemal H. Abawajy, Deakin University, Australia</div><div>Chin-Feng Lee, Chaoyang University of technology, Taiwan</div><div><br></div><div><br></div><div>Publication Co-Chairs</div><div><br></div><div>Fang Qi, Central South University, China</div><div>Congxu Zhu, Central South University, China </div><div><br></div><div><br></div><div>Finance
Co-Chairs</div><div><br></div><div>Jin Zheng, Central South University, China</div><div>Guihua Duan, Central South University, China </div><div><br></div><div><br></div><div>Steering Committee (in alphabetical order)</div><div><br></div><div>Jiannong Cao, Hong Kong Polytechnic University, Hong Kong</div><div>Hsiao-Hwa Chen, National Cheng Kung University, Taiwan</div><div>Minyi Guo, Shanghai Jiao Tong University, China</div><div>Weijia Jia, City University of Hong Kong, Hong Kong</div><div>Jie Li, University of Tsukuba, Japan</div><div>Jianhua Ma, Hosei University, Japan</div><div>Peter Mueller, IBM Zurich Research Laboratory, Switzerland</div><div>Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain</div><div>Indrakshi Ray, Colorado State University, USA</div><div>Kouichi Sakurai, Kyushu University, Japan</div><div>Srinivas Sampalli, Dalhousie University, Canada</div><div>Ivan Stojmenovic, University of Ottawa,
Canada</div><div>Bhavani Thuraisingham, The University of Texas at Dallas, USA</div><div>Jie Wu, Temple University, USA</div><div>Wanlei Zhou, Deakin University, Australia</div><div><br></div><div><br></div><div>Organizing Committee</div><div><br></div><div>Zhaohui Dai, Central South University, China</div><div>Ming Fu, Changsha University of Science and Technology, China</div><div>Zhigang Hu, Central South University, China</div><div>Changyun Li, Hunan University of Technology, China</div><div>Hui Li, Central South University, China</div><div>Kenli Li, Hunan University, China</div><div>Hong Liu, Hunan Normal University, China</div><div>Jianxun Liu, Hunan University of Science and Technology, China</div><div>Renren Liu, Xiangtan University, China</div><div>Xinjun Mao, National University of Defense Technology, China</div><div>Ronghua Shi, Central South University, China</div><div>Jianxin Wang, Central South University, China</div><div>Beiji Zou, Central
South University, China</div><div><br></div><div><br></div><div>Secretariats</div><div><br></div><div>Pin Liu, Central South University, China</div><div>Yongming Xie, Central South University, China </div><div><br></div><div><br></div><div>Webmasters</div><div><br></div><div>Qian Li, Central South University, China</div><div>Xiaofei Xing, Central South University, China</div><div> </div><div><br></div><div>Contact </div><div><br></div><div>Please email inquiries concerning IEEE TrustCom 2011 to: </div><div>Prof. Guojun Wang: csgjwang AT gmail DOT com </div><div>and the conference organizers: TrustCom2011 AT gmail DOT com</div><div>Homepage: http://trust.csu.edu.cn/faculty/~csgjwang/ </div><div>---------------------------------------------------------------------------------</div><div><br></div><div>---------------------------------------------------------------------------------</div><div>Symposiums/Workshops for IEEE
TrustCom 2011</div><div><br></div><div>(1) The Third IEEE International Symposium on UbiSafe Computing (IEEE UbiSafe 2011) </div><div>http://trust.csu.edu.cn/conference/UbiSafe2011/</div><div><br></div><div>Main Organizers:</div><div>Prof. Hsiao-Hwa Chen, National Cheng Kung University, Taiwan </div><div>Prof. Hamid Sharif, University of Nebraska-Lincoln, USA</div><div>Prof. Xiaolin (Andy) Li, University of Florida, USA</div><div><br></div><div><br></div><div>(2) The Third IEEE International Workshop on Security in e-Science and e-Research (IEEE ISSR 2011)</div><div>http://trust.csu.edu.cn/conference/ISSR2011/</div><div><br></div><div>Main Organziers:</div><div>Prof. Richard Sinnott, University of Melbourne, Australia</div><div>Prof. Jie Wei, University of West London, UK</div><div>Prof. Kouichi Sakurai, Kyushu University, Japan</div><div><br></div><div><br></div><div>(3) The 2011 IEEE International Workshop on Security and Privacy in Internet
of Things (IEEE SPIoT 2011)</div><div>http://trust.csu.edu.cn/conference/SPIoT2011/</div><div><br></div><div>Main Organizers:</div><div>Prof. Indrakshi Ray, Colorado State University, USA</div><div>Prof. John Fiore, Temple University, USA</div><div>Prof. Weirong Liu, Central South University, China</div><div><br></div><div><br></div><div>(4) The 2011 IEEE International Workshop on Anonymity and Communication Systems (IEEE ACS 2011)</div><div>http://trust.csu.edu.cn/conference/ACS2011/</div><div><br></div><div>Main Organizers:</div><div>Prof. Bart Preneel, Katholieke Universiteit Leuven, Belgium</div><div>Prof. Jianhua Ma, Hosei University, Japan</div><div>Prof. Guihua Duan, Central South University, China</div><div><br></div><div><br></div><div>(5) The 2011 IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications (IEEE TrustID
2011)</div><div>http://trust.csu.edu.cn/conference/TrustID2011/</div><div><br></div><div>Main Organizers:</div><div>Prof. Zheng Yan, Aalto University, Finland/XiDian University, China</div><div>Prof. Raimo Kantola, Aalto University, Finland</div><div>Prof. Peng Zhang, Xi'an University of Post and Telecommunications, China</div><div><br></div><div> </div><div>(6) The 2011 IEEE International Workshop on Security and Quantum Communications (IEEE SQC 2011)</div><div>http://trust.csu.edu.cn/conference/SQC2011/</div><div> </div><div>Main Organizers:</div><div>Prof. Ronghua Shi, Central South University, China</div><div>Prof. Guihua Zeng, Shanghai Jiao Tong University, China</div><div>Prof. Ying Guo, Central South University, China</div><div><br></div><div><br></div><div>(7) The 2011 IEEE International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011)</div><div>http://tscloud.org/</div><div><br></div><div>Main
Organizers:</div><div>Prof. Ryan K. L. Ko, Hewlett Packard Laboratories, Singapore</div><div>Prof. Markus Kirchberg, Hewlett Packard Laboratories, Singapore </div><div>---------------------------------------------------------------------------------</div><div style="font-size: 12pt; font-family: times, serif; "><br></div></div></div></div><br><br></div></div></div></body></html>