Submission Deadline: 1 September 2017
IEEE Access invites manuscript submissions in the area of Trusted Computing.
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG, https://trustedcomputinggroup.org/, which is an international organization for developing industrial standards on secure and trusted computing). TC aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. Based on Trusted Platform Module (TPM) and TCG Software Stack (TSS) as specified in TCG standard documents, a suit of mechanisms including memory curtaining, protected execution, secure I/O, sealed storage, platform measurement and remote attestation can be realized. Furthermore, security and trust in digital computing, communication and networking can be established based on TPM. In the past twenty years, there have been quite a number of vivid research activities performed in the field of trusted computing. Recent efforts focus on TC module development and extension, trustworthy software assurance, Trusted Execution Environment (TEE), trusted collaboration and trusted storage.
However, with the fast development of emerging technologies, such as Internet of Things (IoT), 5G wireless technologies, machine learning, data mining, artificial intelligence, cloud and fog computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV), new challenges are raised with regard to trusted computing. First, the security aspect of trust emphasized by the TC is not sufficient to confront current challenges in emerging information and communication technologies. Other requirements, such as availability, reliability, maintainability and usability should also be addressed. Second, current TC technologies focus on establishing trust, but how to maintain trust in dynamically changed environments requires a study with deep-insight. Third, this kind of “hard trust” solution of TC cannot support the subjective nature of trust. How to effectively integrate trusted computing with trust and reputation management and how to incorporate TC with the advance of data mining and machine learning in order to offer super-intelligence are interesting research topics. Also, the trust of trusted computing is still an open issue. Finally, we are still facing a number of practical issues and expecting to solve them by applying TC, e.g., in 5G wireless systems, IoT systems, and social networking.
All of above raise special requirements on the continuous development and evolution of TC technologies in order to overcome new technical requirements and scientific challenges. This Special Section in IEEE Access aims to bring together researchers and practitioners to discuss various aspects of trusted computing, explore key theories, investigate technology enablers, develop significant applications and innovate new methodologies, schemes, algorithms and solutions for overcoming major challenges in this exciting research area. Topics of interest of this Special Section include, but are not limited to:
We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.
Associate Editor: Zheng Yan, Xidian University, China and Aalto University, Finland
Relevant IEEE Access Special Sections:
IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland
Paper submission: Contact Associate Editor and submit manuscript to:
For inquiries regarding this Special Section, please contact: firstname.lastname@example.org