From valerio.arnaboldi at iit.cnr.it Tue Nov 8 05:19:07 2011 From: valerio.arnaboldi at iit.cnr.it (Valerio Arnaboldi) Date: Tue, 08 Nov 2011 14:19:07 +0100 Subject: [sigcomm] Pervasive and Mobile Computing journal: Special Issue on Pervasive Urban Applications Message-ID: <5cd26a8987a2ac4a657d90d3bbb6b006@iit.cnr.it> ======================== CALL FOR PAPERS ========================= Elsevier - Pervasive and Mobile Computing Special Issue on Pervasive Urban Applications ================================================================== Over the past decade, the development of digital networks and operations has produced an unprecedented wealth of information. Handheld electronics, location devices, telecommunications networks, and a wide assortment of tags and sensors are constantly producing a rich stream of data reflecting various aspects of urban life. For urban planners and designers, these accumulations of digital traces are valuable sources of data in capturing the pulse of the city in an astonishing degree of temporal and spatial detail. Yet this condition of the hybrid city - which operates simultaneously in the digital and physical realms - also poses difficult questions about privacy, scale, and design, among many others. These questions must be addressed as we move toward achieving an augmented, fine-grained understanding of how the city functions - socially, economically and yes, even psychologically. This special issue aims to advance understanding of research challenges and opportunities in applying the pervasive computing paradigm to urban spaces. We are seeking multi-disciplinary contributions that reveal interesting aspects about urban life and exploit the digital traces to create novel urban applications that benefit citizens, urban planners, and policy makers. In this special issue, we are seeking high quality papers reporting original research results on Pervasive Urban Applications with a preference for works including evaluation studies based on empirical data of actual urban environments. Relevant topics include (but are not limited to): - Pervasive computing applications for urban planning and design - Mining of data collected from urban networks e.g. transportation, energy - Urban mobility and geo-localization - Multi-source urban information integration - Real-time urban information processing - Knowledge representation and reasoning on city data - Case studies and applications of mixed urban sensing and mining - Analysis of social networks in urban space - Middleware for mobile urban computing - Context-aware systems for urban space - Pervasive urban applications for smart cities - Intelligent urban transportation systems - Empirical evaluation of pervasive urban applications - Wireless sensor networks, and social network sensing for pervasive urban applications - Security, privacy, reputation, and trust issues in urban computing - Impact of pervasive technologies in urban space e.g. social, economical, and psychological. Submission process: All submissions must be prepared according to the Guide for Authors as published in the Journal website at http://www.ees.elsevier.com/pmc/. Authors should select SI: Pervasive Urban Applications, from the pull-down menu during the submission process. All contributions must not have been previously published or be under consideration for publication elsewhere. A submission based on one or more papers that appeared elsewhere must have major value-added extensions over what appeared previously (at least 33% new material). Authors are requested to submit their relevant, previously published articles and a summary document explaining the enhancements made in the journal version. Important Dates: Paper submission deadline: December 14, 2011 (Extended deadline) First Notification: March 31, 2012 Final Notification: June 15, 2012 Guest Editors of the Special Issue: Francesco Calabrese, IBM Research, Dublin, Ireland, fcalabre at ie.ibm.com Marco Conti, IIT-CNR, Pisa, Italy, marco.conti at iit.cnr.it Dominik Dahlem, MIT, USA, dahlem at mit.edu Giusy Di Lorenzo, IBM Research, Dublin, Ireland, giusydil at ie.ibm.com Santi Phithakkitnukoon, Newcastle University, UK, santi at newcastle.ac.uk From trust2012 at sba-research.org Wed Nov 30 05:09:17 2011 From: trust2012 at sba-research.org (trust2012) Date: Wed, 30 Nov 2011 13:09:17 +0000 Subject: [sigcomm] TRUST 2012 Message-ID: <600C904F06E46446BE46FBE4D5E010CD0862ABA1@SATVIEEX02.securityresearch.local> Call for Paper TRUST 2012 TRUST 2012 is an international conference on the technical and soci-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems. Building on the success of TRUST 2011 (held in Pittsburgh, USA) and TRUST 2010 (held in Berlin, Germany) TRUST 2009 (held in Oxford, UK), this conference focuses on trusted and trustworthy computing, both from the technical and social perspectives. The conference itself has two main strands, one devoted to technical aspects and one devoted to the socio-economic aspects of trusted computing. Important dates: Submission due: 22 February 2012, 23:59 UTC Notification: 25 March 2012 Camera ready: 09 April 2012 Conference: 13-15 June 2012 The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to: Technical Strand: Architecture and implementation technologies for trusted platforms and trustworthy infrastructures Trust, Security and Privacy in embedded systems Trust, Security and Privacy in social networks Trusted mobile platforms and mobile phone security Implementations of trusted computing (hardware and software) Applications of trusted computing Trustworthy infrastructures and services for cloud computing (including resilience) Attestation and integrity verification Cryptographic aspects of trusted and trustworthy computing Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs) Intrusion resilience in trusted computing Virtualization for trusted platforms Secure storage Security policy and management of trusted computing Access control for trusted platforms Privacy aspects of trusted computing Verification of trusted computing architectures Usability and end-user interactions with trusted platforms Limitations of trusted computing Socio-economic Strand: Usability and user perceptions of trustworthy systems and risks Effects of trustworthy systems upon user, corporate, and governmental behavior Economic drivers for trustworthy systems in corporate environment The impact of trustworthy systems in enhancing trust in cloud-like infrastructures The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight The impact of trustworthy systems upon digital forensics, police investigations and court proceedings Game theoretical approaches to modeling or designing trustworthy systems Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space Experimental economics studies of trustworthiness The interplay between privacy, privacy enhancing technologies and trustworthy systems Critiques of trustworthy systems Best regards Yvonne Poul Organisation TRUST 2012 -------------- next part -------------- An HTML attachment was scrubbed... URL: http://mailman.postel.org/pipermail/sigcomm/attachments/20111130/9abcdb38/attachment.html From touch at isi.edu Wed Nov 30 10:26:51 2011 From: touch at isi.edu (Joe Touch) Date: Wed, 30 Nov 2011 10:26:51 -0800 Subject: [sigcomm] INAPPROPRIATE POST -- Re: TRUST 2012 In-Reply-To: <600C904F06E46446BE46FBE4D5E010CD0862ABA1@SATVIEEX02.securityresearch.local> References: <600C904F06E46446BE46FBE4D5E010CD0862ABA1@SATVIEEX02.securityresearch.local> Message-ID: <4ED6756B.8060009@isi.edu> Hi, all, As a reminder, this is an INAPPROPRIATE POST. Only meetings endorsed by ACM SIGCOMM may post CFPs to this list. I will be updating the filters to reduce the probability of this sort of error, but posters are warned to review our posting policies BEFORE posting. Joe (list admin) On 11/30/2011 5:09 AM, trust2012 wrote: > *Call for Paper TRUST 2012*