*Call for Papers***

*IEEE Transactions on Reliability Special Section on /Trustworthy 
Computing/*

*Background
*

Trustworthy Computing (TC) has been applied to software-enabled 
computing systems and networks that are inherently secure, private, 
available, and reliable. As the fast growing mobile cloud computing 
emerges to cover smart phones, tablets, smart TV, and cloud computing 
platforms, these ubiquitous computing devices poses new challenges to 
trustworthy computing. Cloud computing offers organizations of all sizes 
the ability to embrace and implement new applications at far less cost 
than traditional approaches. Organizations that move workloads to the 
cloud take advantage of the capabilities of their cloud providers to 
ensure continuous availability of services. However, the ever-growing 
complexity of such systems and the software that controls them not only 
makes it much more difficult to guarantee their quality, but also 
introduces more vulnerability for malicious attacks, intrusion, and data 
loss.


To address these needs, this special section calls for novel 
applications of emerging techniques for trustworthy computing of 
information, software, systems, networks. Reviews and case studies which 
address state-of-art research and state-of-practice industry experiences 
are also welcomed.

*Topics
*

The topics of interest include, but are not limited to:

 o - Security, reliability, privacy, and availability issues in computing 
systems and networks;

 o - Trustworthy computing in small or large systems, such as mobile 
devices, embedded systems, cloud computing platforms, and internet of 
things;

 o - Information, system, and software assurance;

 o - Auditing, verification, validation,

 o - security testing, evaluation, and measurement;

 o - Data protection, maintenance, recovery, and risk assessment ;

 o - Authentication, authorization, access control, and accounting;

 o - penetration analysis, intrusion detection and prevention,;

 o - Malware behavior analysis, and software vulnerability discovery;

 o - Hardware techniques facilitating trustworthy computing, such as Trusted 
     Platform Module (TPM);

 o - Trustworthy operating systems and applications;

 o - Cloud Computing

 o - Mobile Computing

 o - Software defined networking (SDN)

 o - Cryptographic techniques.

*Submission Information*

We welcome high quality submissions that are original work, not 
published or currently submitted elsewhere. We also encourage 
significant extensions to conference papers, as long as the submitted 
paper is fully new. Information for authors can be found at 
http://rs.ieee.org/images/files/Publications/Trans_Reliability/information_readers_and_authors.pdf. 
A single column, double space submission is preferred, and its page 
limit is flexible. However, we expect that the manuscript length is 
approximately equivalent to 10 pages of a two column, single space 
paper. We accept only electronic submissions, so email is the preferred 
method. Submit your original pdf or doc(x) file to Managing Editor Jason 
W. Rupe at jrupe@ieee.org jrupe@ieee.org>, indicating your 
submission to this special section by its title.

*Important Dates*

November 1, 2013

Paper submission deadline

*Guest Editor: Shiuhpyng Winston Shieh,* Dept. of Computer Science, 
National Chiao Tung University, ssp@cs.nctu.edu.tw 


For more information, please refer to the CFP in IEEE Reliability Society
Newsletter: http://rs.ieee.org/images/files/newsletters/2013/1_2013/CFP3.htm