[p2p-hackers] Third ACM SAC Trust/Collaboration TRECK Track (ACM proceedings and Journal special issue)
<p2p-hackers@lists.zooko.com> (We apologize if you receive multiple copies of this message) CALL FOR PAPERS - SAC 2007 The 22nd ACM Symposium on Applied Computing March 11 - 15, 2007, Seoul, South Korea http://www.acm.org/conferences/sac/sac2007/ Track: Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK) Proceedings: ACM printed form, ACM CD-ROM, ACM digital library and IJI Journal special issue (printed and online ISSN)! Aims and scope of the TRECK track: Computational models of trust and online reputation mechanisms have been gaining momentum. One reason for this is that traditional security mechanisms are challenged by open, large scale and decentralised environments. The use of an explicit trust/reputation management component goes beyond security though. The goal of the ACM SAC 2007 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions and virtual organisations. In last year TRECK, a paper even described how computational trust and reputation could mitigate the privacy issues of trusted computing hardware modules. The TRECK track covers all computational trust applications, especially those used in real-world applications. The topics of interest include, but are not limited to: Recommender and reputation systems Trust-enhanced collaborative applications Trusted computing, trusted platorm modules (TPM, TCG, TCPA, NGSCB...) Trading privacy for trust and security Tangible guarantees given by formal models of trust and risk Trust metrics assessment and threat analysis Pervasive computational trust and use of context-aware features Trust/risk-based security frameworks Automated collaboration and trust negotiation Trust in peer-to-peer systems Technical trust evaluation Impacts of social networks on computational trust Evidence gathering and management Real-world applications, running prototypes and advanced simulations Applicability in large-scale, open and decentralised environments Legal and economic aspects related to the use of trust engines User-studies and user interfaces of computational trust applications Submission guidelines are posted on the TRECK 2007 website (http://www.trustcomp.org/treck/), which always contains the latest updates. Authors are invited to submit full papers about original and unpublished research. A paper cannot be submitted to more than one track. We would like to encourage the submission of industrial experience reports and reports of innovative computing applications. The body of each paper should not exceed 5,000 words. Submissions should be properly anonymized to facilitate blind reviewing. At least three reviewers will be assigned to each submission to the TRECK track. IMPORTANT DUE DATES Until Sep. 8, 2006: PDF extended abstract submission of the full paper (500 words maximum; this deadline may be extended) Sep. 8, 2006: Full paper submission Oct. 16, 2006: Author notification Oct. 30, 2006: Camera-ready copy Mar. 11-15, 2007: SAC in Seoul, South Korea Conference Venue: Seoul is the capital of South Korea and the ancient seat of Korea's royalty. Therefore, there are many magnificent palaces, cultural places and old monuments to visit. Track Program Chair: Jeong Hyun Yi, Samsung Advanced Institute of Technology, South Korea Organisation Chair: Jean-Marc Seigneur, University of Geneva, Switzerland, Jean-Marc.Seigneur@trustcomp.org Track Program Committee: Jeong Hyun Yi, Samsung Advanced Institute of Technology, South Korea Jean-Marc Seigneur, University of Geneva, Switzerland Christian D. Jensen, Technical University of Denmark, Denmark Fabio Martinelli, IIT-CNR, Italy Stephen Marsh, National Research Council of Canada Stephane Lo Presti, University of London, United Kingdom Ciaran Bryce, INRIA Rennes, France Philippe Jaillon, Ecole des Mines de Saint-Etienne, France Hai Jin, Huazhong University of Science and Technology, China Sven Lachmund, DoCoMo Euro-Labs, Germany Yanjun Zuo, University of North Dakota, USA Jonathan Poritz, University of Colorado at Colorado Springs, USA Giannis F. Marias, University of Athens, Greece Daniele Quercia, University College London, United Kingdom Bruno Crispo, Vrije Universiteit Amsterdam, The Netherlands Noria Foukia, University of Otago, New Zealand Uwe Roth, University of Luxembourg, Luxembourg Deqing Zou, Huazhong University of Science and Technology, China Victor S. Grishchenko, Ural State University, Russia Sviatoslav Braynov, University of Illinois at Springfield, USA Rino Falcone, CNR Institute of Cognitive Sciences and Technologies, Italy Damien Weldon, LoanPerformance, USA Seamus Moloney, Nokia Research Center, Finland Evangelos Kotsovinos, Deutsche Telekom Laboratories, Germany Jianshu Weng, Nanyang Technological University, Singapore Wanita Sherchan, Monash University, Australia Charles A. Shoniregun, University of East London, United Kingdom Laurence Vignollet, Universiti de Savoie, France Darren P. Mundy, University of Hull, United Kingdom Hugo Miranda, University of Lisbon, Portugal Ayman Kassi, American University of Beirut, Lebanon Javier Lopez, University of Malaga, Spain _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
participants (1)
-
Jm Seigneur