Topics

SAC 2015:

For the past twenty years, the ACM Symposium on Applied Computing has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the world.

Aims and scope of the TRECK track:

Computational models of trust and online reputation mechanisms have been gaining momentum. The ACM SAC 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 and 2014 TRECK tracks attracted more than 280 researchers from both academia and industry who have joined an online group at http://tech.groups.yahoo.com/group/trustcomp/

The goal of the ACM SAC 2015 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation, also called e-reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust/reputation applications, especially those used in real-world applications.

We would like to emphasize that we may accept the submission of industrial experience reports, commercial tools case studies and reports of innovative computing applications if they are written in a scientific way.

This year, we have a special focus on Bring Your Own Device (BYOD) and corporate security, trust, risk and privacy so those kinds of contributions are especially welcome!

The FP7 MUSES project investigates BYOD and corporate security, trust, risk and privacy and sponsors the ACM SAC'15 TRECK track, more information on MUSES (Multiplatform Usable Endpoint Security) by clicking on the logo below:

The topics of interest include, but are not limited to:
  • Trust management, reputation management and identity management
  • Recommender and reputation systems
  • Online reputation and e-réputation
  • Pervasive computational trust and use of context-awareness
  • Mobile trust, context-aware trust
  • Web 2.0 reputation and trust
  • Trust-based collaborative applications
  • Automated collaboration and trust negotiation
  • Trade-off between privacy and trust
  • BYOD and corporate security, trust, risk and privacy
  • Trust and risk-based security frameworks
  • Combined computational trust and trusted computing
  • Tangible guarantees given by formal models of trust and risk
  • Trust metrics assessment and threat analysis
  • Trust in peer-to-peer and open source systems
  • Technical trust evaluation and certification
  • Trust self-organisation
  • Impacts of social networks on computational trust
  • Evidence gathering and management
  • Real-world applications, running prototypes and advanced simulations
  • Applicability in large-scale, open and decentralised environments
  • Legal and economic aspects related to the use of trust and reputation engines
  • User-studies and user interfaces of computational trust and online reputation applications