Trusted Computing

Submission Deadline: 1 September 2018

IEEE Access invites manuscript submissions in the area of Trusted Computing.

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG,, which is an international organization for developing industrial standards on secure and trusted computing). TC aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. Based on Trusted Platform Module (TPM) and TCG Software Stack (TSS) as specified in TCG standard documents, a suit of mechanisms including memory curtaining, protected execution, secure I/O, sealed storage, platform measurement and remote attestation can be realized. Furthermore, security and trust in digital computing, communication and networking can be established based on TPM. In the past twenty years, there have been quite a number of vivid research activities performed in the field of trusted computing. Recent efforts focus on TC module development and extension, trustworthy software assurance, Trusted Execution Environment (TEE), trusted collaboration and trusted storage.

However, with the fast development of emerging technologies, such as Internet of Things (IoT), 5G wireless technologies, machine learning, data mining, artificial intelligence, cloud and fog computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV), new challenges are raised with regard to trusted computing. First, the security aspect of trust emphasized by the TC is not sufficient to confront current challenges in emerging information and communication technologies. Other requirements, such as availability, reliability, maintainability and usability should also be addressed. Second, current TC technologies focus on establishing trust, but how to maintain trust in dynamically changed environments requires a study with deep-insight. Third, this kind of “hard trust” solution of TC cannot support the subjective nature of trust. How to effectively integrate trusted computing with trust and reputation management and how to incorporate TC with the advance of data mining and machine learning in order to offer super-intelligence are interesting research topics. Also, the trust of trusted computing is still an open issue. Finally, we are still facing a number of practical issues and expecting to solve them by applying TC, e.g., in 5G wireless systems, IoT systems, and social networking.

All of above raise special requirements on the continuous development and evolution of TC technologies in order to overcome new technical requirements and scientific challenges. This Special Section in IEEE Access aims to bring together researchers and practitioners to discuss various aspects of trusted computing, explore key theories, investigate technology enablers, develop significant applications and innovate new methodologies, schemes, algorithms and solutions for overcoming major challenges in this exciting research area. Topics of interest of this Special Section include, but are not limited to:

  • Security analysis on TPM
  • Trusted computing module development, extension and evolution
  • Trusted computing standardization
  • Trustworthy software
  • Trusted execution environment (TEE)
  • Trusted storage
  • Mobile trusted computing platform and mobile platform module
  • Trusted computing for 5G wireless systems and mobile networks
  • Trusted computing for SDN and NFV
  • Trusted computing for IoT and IoE
  • Trusted computing for cloud computing and fog computing
  • Trusted computing for social networking
  • Trusted computing for smart grid
  • Trusted computing based security and privacy solutions
  • Usable trusted computing
  • Autonomic trusted computing
  • Trust collaboration based on trusted computing
  • Trust and reputation management
  • Trust evaluation theories and algorithms
  • Data trust management
  • Trust in human-computer interaction
  • Use cases and applications of trusted computing

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.


Associate Editor: Zheng Yan, Xidian University, China and Aalto University, Finland

Guest Editors:

  1. Dr. Venu Govindaraju, University at Buffalo, USA
  2. Dr. Qinghua Zheng, Xi’an Jiaotong University, China
  3. Dr. Yan Wang, Macquarie University, Australia


Relevant IEEE Access Special Sections:

  1. Recent Advances on Radio Access and Security Methods in 5G Networks
  2. Trust Management in Pervasive Social Networking (TruPSN)


IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:

For inquiries regarding this Special Section, please contact: