Call for Papers 4th International Conference on Trusted Cloud Infrastructure (ICTCI 2010) ( Conference web site: http://ppi.fudan.edu.cn/ictci2010/index.html ) Knowledge and Innovation Center, Shanghai, China October 18-20, 2010 Cloud computing redefines ways for storing and processing information toward that information is permanently stored and processed in large data centers of shared server infrastructure, and temporarily cached on and used by client devices. This fundamental paradigm change in our IT infrastructure has given rise to many new trust and security challenges for protecting the user's information which is no longer under well physical controls of the user. Issues from data availability, integrity and confidentiality, trustworthiness of shared computing and storage resources, isolation of the user computing space in a virtualized data center, to IT regulations such as governance, risk and compliance (IT GRC), etc., now all have new concerns and face unanticipated vulnerabilities. These invite not only research for better understanding these new issues but also innovation for novel solutions to emerging problems. We organize 4th International Conference on Trusted Cloud Infrastructure (ICTCI 2010), which is a sequel to 3rd Asia-Pacific Trusted Computing Infrastructure Technologies ( APTC 2008 http://grid.hust.edu.cn/aptc08/ ), to continue the forum for presentations of research results and experience reports on leading-edge issues in trust and security for cloud computing. Topics of interests for ICTCI 2010 include, but not limited to, the following subject categories: Theory and practice in Trusted Computing Secure operating systems Trusted virtual cloud infrastructure Secure management of virtualized cloud resources Secure network architecture for cloud computing Security and privacy aware cloud protocol design Access control for data center applications Key management for data center applications Trust and policy management in clouds IT Governance, Risk and Compliance Identification and privacy in cloud Remote data integrity protection Off-premise execution software integrity and privacy Secure computation outsourcing Dynamic data operation security Software and data segregation security Failure detection and prediction Secure data management within and across data centers Availability, recovery and auditing Secure wireless and mobile connections to the cloud Information leakage through covert and side channels Authors are invited to submit original research results not previously published nor submitted in parallel for publication to any other conference, workshop or journal. A submission should follow the IEEE 8.5" x 11" Two-Column Format, and limited to 10 pages, plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version. The proceedings will be published by IEEE Computer Society Press and will be available at the conference. Important Dates: * Submission deadline: May 15, 2010, 00:00 Beijing Time * Notification: July 15, 2010 * Proceedings version: August 15, 2010 * Conference: October 18-20, 2010 Organization Committees: Program Co-Chairs Wenbo Mao, EMC Research China, China Sihan Qing, Chinese Academy of Sciences, China Binyu Zang, Fudan University, China Publication Chair Hai Jin, Huazhong University of Science and Technology, China Technical Program Committee Listed in the conference web page