打印本文 关闭窗口 | |||||||||||||||||||||||
The 2011 International Workshop on Network Security and Trusted Computing | |||||||||||||||||||||||
作者:佚名 文章来源:不详 点击数 更新时间:2011-1-8 18:21:02 文章录入:xiaohe 责任编辑:xiaohe | |||||||||||||||||||||||
|
|||||||||||||||||||||||
ISPA 2011 The 2011 International Workshop on Network Security and Trusted Computing May 26-28, http://www.ftrai.org/ispa2011/index.php
Abstract - Brief description Following the success of NSTC 2009 in Xiamen, China, during October 11-14, 2009. The IEEE International Workshop on Network Security and Trust Computing (NSTC2011) will be held on 26-28 May 2011, Busan, Korea. NSTC2011 which will be in conjunction with The 9th IEEE International Symposium on Parallel and Distributed Processing and Application (ISPA 2011) which is sponsored by IEEE Technical Committee on Scalable Computing (TCSC) and IEEE Computer Society. The wide deployment of networks and various emerging threats including virus, DoS and bots have created a very strong demand for security service. This trend has also provided many new opportunities and challenges to network device vendors, security software manufacturer, Internet service provider and solution integrators. Living in a security network world changes and enhances people’s life in many ways, such as communications, information sharing and learning, e-commerce and wireless application services. The area has become a very hot research subject in both business and research communities. The major theme of this workshop is to study new attack methods, detection models, emerging technology and engineering methods to build the next generation of network security service systems supporting large scale network users anywhere at anytime, which is a major challenge for organizations,with new and increasingly complex threats. Trusted Computing (TC) is the industry"s answer to growing security problems in the enterprise and is based on a hardware root of trust. It can be used to address enterprise security challenges including authentication, data protection, identity and access management, password management, network access control, disaster recovery and layered security. Trusted Computing will make computers safer, less prone to suffering from viruses and malware, and thus more reliable. The workshop "The 2011 International Workshop on Network Security and Trusted Computing" intends to provide a forum and foster discussion on the recend advance in the research and development in trusted computing and network security. It supplies a platform for researchers from different universities and research institutes to discuss the state of the art for TC and NS. It will focus on the theory and application of trusted computing and network security which are essential for the increasing security requirement.
Topics Topics include, but not limited to :
Publication Every submitted paper will be carefully reviewed by at least three members of the Program Committee. All accepted and presented papers will be included in the conference proceedings published by IEEE. Authors should submit a paper at most 8 pages in length with IEEE CS format. Submission of a paper should be regarded as a commitment that, if the paper be accepted, at least one of the authors will register and attend the conference. Distinguished selected papers accepted and presented in ISPA 2011, after further revisions, will be published in the special issues of the following international journals
Organizing Committee Deqing Zou, Lansheng Han, Yin Heng, Ming Liu,
Submission If the submitted paper is mainly about the trust computing, then email your paper to liuming2008@gmail.com; If the submitted paper is mainly about the malicius codes, email your paper to hanlansheng@hotmail.com ; Else email your paper to nstc2011@gmail.com.
Important Dates
|
|||||||||||||||||||||||
打印本文 关闭窗口 |