Please visit the latest ICACCI2014 website |
Third International Workshop on Trust Management in P2P Systems
(IWTMP2PS-2012), 3 - 5 August 2012, Chennai, India
http://www.icacci-conference.org/iwtmp2ps2012.html
Distributed systems involve numerous entities, many of which haven't previously interacted. A flexible and general-purpose trust management system can maintain current and consistent trustworthiness information for the different entities in a distributed system. P2P computing has emerged as a new distributed computing paradigm of sharing resources available on the Internet. The open and anonymous nature of peer-to-peer (P2P) network makes it an ideal medium for attackers to spread malicious content. The objective of IWTMP2PS is to establish a state of the art for security and trust in P2P systems, and to provide a forum for exchange of ideas between P2P researchers working on trust and security issues.
The first edition of IWTMP2PS was organised in conjunction with Third International Conference on Network Security & Applications (CNSA-2010) in Chennai, India during July 23-25, 2010 (Springer) and the second edition was co-located with ACC2011, July 22-24, 2011, Kochi, India (Springer).
CALL FOR PAPERS
IWTMP2PS2012 invites original and unpublished work from individuals active in the broad theme of the Workshop. The maximum length of the paper is 10 pages (including figures and references). The paper should not contain page numbers or any special headers or footers. Authors should submit their papers online. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at http://www.icacci-conference.org/callpaper.html .
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. The manuscripts should be submitted in PDF format. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the proceedings. At least one full paying author of each accepted paper must register for the Conference before the indicated deadline.
Topics of interest include, but are not limited to:
- Adaptive Security Policy Management
- Agent-Based Trust Management
- Analysis of Security and Privacy Issues in Grids
- Anonymity and Privacy vs. Accountability
- Applications of Trust and Reputation Management in E-Services
- Audit and Accountability in Grid Systems
- Authentication and Identity Management
- Authorization in Trust Management
- Data Management in Mobile P2P Systems
- Decentralized Trust Management
- Digital Rights Management
- Fault Tolerance in P2P Systems
- Free-Riding Prevention Methods
- Grid Security Architectures
- Legal Issues Related To the Management of Trust
- Novel Techniques for Access Control
- P2P Resource Management
- P2P Services and Cloud Computing
- Peer Access and Control in Mobile P2P Systems
- P2P Economics
- Personalized Reputation Management
- Privacy and Identity Management
- Quality of Service and Quality of Experience in P2P Systems
- Reputation-Based Trust Management
- Security in Data and Computational Grids
- Self-organization vs. Security and Trust
- Semantic Web and Trust Management
- Simulation of Trust and Reputation Systems
- Social Networks and Trust Management
- Solutions for Free Riding and Partial Coverage in P2P
- Statistical Models for Trust
- Trust Management in Collaborative Global Computing
- Trust Management Paradigms for Virtual Organizations
Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journal(s):
- International Journal of Trust Management in Computing and Communications (IJTMCC), ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland - http://www.inderscience.com/IJTMCC
Key Dates
Full Paper Submission Ends | 10 April 2012 (Hard Deadline) |
Acceptance Notification | 3 May 2012 |
Final paper Deadline | 16 May 2012 |
Registration Starts | 25 April 2012 |
Author Registration Closes | 17 May 2012 |
Conference | 3 – 5 August 2012 |
Contact Us
Email: iwtmp2ps2012@gmail.com
Technical Program Committee
Program Chairs
Vicent Cholvi, Universitat Jaume I, Spain
Jiankun Hu, University of New South Wales at the Australian Defence Force Academy, Australia
Sabu M. Thampi, IIITM-K, Trivandrum, India
TPC Members
Aleksandra Kovacevic, AGT Germany, Germany
Anand Sharma, MITS, Lakshmangarh, India
Aneel Rahim, COMSATS Institute of Information Technology, Pakistan
Ankur Gupta, Model Institute of Engineering and Technology, India
Arshin Rezazadeh, Iran University of Science and Technology, Iran
Arun Saha, Fujitsu, USA
Arup Pal, Indian School of Mines, Dhanbad, India
Benoit Hudzia, SAP Research, United Kingdom
Bo Zhang, Rice University, USA
Chang Wu Yu, Chung Hua University, Taiwan
Cheng-Fu Chou, NTU, Taiwan
Demin Wang, Microsoft, USA
Farag Azzedin, King Fahd University of Petroleum & Minerals, Saudi Arabia
Guangzhi Qu, Oakland University, USA
Houcine Hassan, Universidad Politecnica de Valencia, Spain
Ioannis Anagnostopoulos, University of the Aegean, Greece
Jianguo Ding, University of Luxembourg, Luxemburg
Jiping Xiong, Zhejiang Normal University, P.R. China
John Buford, Avaya Labs Research, USA
Jonathan Loo, Middlesex University, United Kingdom
Joseph Micheal, Joseph Engineering College, India
Juan-Carlos Cano, Universidad Politecnica de Valencia, Spain
Julien Bourgeois, University of Franche-Comte, France
Komathy Karuppanan, Anna University, India
Li-Can Huang, Zhejiang Sci-Tech University, P.R. China
Marjan Naderan, Amirkabir University of Technology, Iran
Markus Fiedler, Blekinge Institute of Technology, Sweden
Matteo Dell’Amico, Eurecom, France
Michael Hempel, University of Nebraska-Lincoln, USA
Mohamad Zoinol Abidin Aziz, Universiti Teknikal Malaysia Melaka, Malaysia
Mohamed Ali Kaafar, INRIA, France
Mohd Sadiq, Jamia Millia Islamia, India
Paulo Gondim, Universidade de Brasilia, Brazil
Phan Cong-Vinh, NTT University, Vietnam
Renjie Huang, Washington State University, USA
Roksana Boreli, National ICT Australia, Australia
Samir Saklikar, RSA, Security Division of EMC, India
Steven Gordon, Thammasat University, Thailand
Sudarshan TSB, Amrita School of Engineering, India
Thomas Fuhrmann, Technische Universitat Manchen, Germany
Thorsten Strufe, TU Darmstadt, Germany
Vana Kalogeraki, Athens University of Economics and Business, Greece
Vikas Saxena, Jaypee Institute of Information Technology, India
Visvasuresh Victor Govindaswamy, Texas A&M University-Texarkana, USA
Xiaofei Liao, Huazhong University of Science and Technology, P.R. China
Xinheng, Wang, Swansea University, United Kingdom
Yann Busnel, University of Nantes, France
Yonglin Ren, SITE, University of Ottawa, Canada
Zhihua Cui, Taiyuan University of Science and Technology, P.R. China