Call for Papers

4th International Conference on Trusted Cloud Infrastructure (ICTCI
( Conference web site: )

Knowledge and Innovation Center, Shanghai, China
October 18-20, 2010

Cloud computing redefines ways for storing and processing information
toward that information is permanently stored and processed in large
data centers of shared server infrastructure, and temporarily cached on
and used by client devices. This fundamental paradigm change in our IT
infrastructure has given rise to many new trust and security challenges
for protecting the user's information which is no longer under well
physical controls of the user. Issues from data availability, integrity
and confidentiality, trustworthiness of shared computing and storage
resources, isolation of the user computing space in a virtualized data
center, to IT regulations such as governance, risk and compliance (IT
GRC), etc., now all have new concerns and face unanticipated
vulnerabilities. These invite not only research for better understanding
these new issues but also innovation for novel solutions to emerging
problems. We organize 4th International Conference on Trusted Cloud
Infrastructure (ICTCI 2010), which is a sequel to 3rd Asia-Pacific
Trusted Computing Infrastructure Technologies ( APTC 2008 ), to continue the forum for
presentations of research results and experience reports on leading-edge
issues in trust and security for cloud computing. Topics of interests
for ICTCI 2010 include, but not limited to, the following subject

Theory and practice in Trusted Computing
Secure operating systems
Trusted virtual cloud infrastructure
Secure management of virtualized cloud resources
Secure network architecture for cloud computing
Security and privacy aware cloud protocol design
Access control for data center applications
Key management for data center applications
Trust and policy management in clouds
IT Governance, Risk and Compliance
Identification and privacy in cloud
Remote data integrity protection
Off-premise execution software integrity and privacy
Secure computation outsourcing
Dynamic data operation security
Software and data segregation security
Failure detection and prediction
Secure data management within and across data centers
Availability, recovery and auditing
Secure wireless and mobile connections to the cloud
Information leakage through covert and side channels

Authors are invited to submit original research results not previously
published nor submitted in parallel for publication to any other
conference, workshop or journal. A submission should follow the IEEE
8.5" x 11" Two-Column Format, and limited to 10 pages, plus up to 2
over-length pages. If the paper is accepted for publication, an
over-length fee will be charged to each of the over-length pages, at
$200 per page in the final camera-ready version. The proceedings will be
published by IEEE Computer Society Press and will be available at the

Important Dates:
*	Submission deadline: May 15, 2010, 00:00 Beijing Time
*	Notification: July 15, 2010
*	Proceedings version: August 15, 2010
*	Conference: October 18-20, 2010

Organization Committees:

Program Co-Chairs
Wenbo Mao, EMC Research China, China
Sihan Qing, Chinese Academy of Sciences, China
Binyu Zang, Fudan University, China

Publication Chair
Hai Jin, Huazhong University of Science and Technology, China

Technical Program Committee
Listed in the conference web page