For the past twenty years, the ACM Symposium on Applied Computing has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the world.
Aims and scope of the TRECK track:
Computational models of trust and online reputation mechanisms have been gaining momentum. The ACM SAC 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 and 2014 TRECK tracks attracted more than 280 researchers from both academia and industry who have joined an online group at http://tech.groups.yahoo.com/group/trustcomp/
The goal of the ACM SAC 2015 TRECK track remains to review the set of applications that benefit from the use of computational trust and online reputation, also called e-reputation. Computational trust has been used in reputation systems, risk management, collaborative filtering, social/business networking services, dynamic coalitions, virtual organisations and even combined with trusted computing hardware modules. The TRECK track covers all computational trust/reputation applications, especially those used in real-world applications.
We would like to emphasize that we may accept the submission of industrial experience reports, commercial tools case studies and reports of innovative computing applications if they are written in a scientific way.
This year, we have a special focus on Bring Your Own Device (BYOD) and corporate security, trust, risk and privacy so those kinds of contributions are especially welcome!
The FP7 MUSES project investigates BYOD and corporate security, trust, risk and privacy and sponsors the ACM SAC'15 TRECK track, more information on MUSES (Multiplatform Usable Endpoint Security) by clicking on the logo below:
The topics of interest include, but are not limited to: