Session 07-TUN-MM

Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection

(TUN-MM 2014)


As part of

The International Conference on High Performance Computing & Simulation (HPCS 2014)

July 21 – July 25, 2014

The Savoia Hotel Regency

Bologna, Italy or

Extended Submission Deadline: March 25, 2014

Submissions could be for full papers, short papers, poster papers, or posters


Recent years have witnessed rapid developments of the information communication technology and the Next-Generation Internet. 3G and 4G wireless mobile networks have been striding to a large-scale deployment and application. So, we have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which made it possible to realize the ubiquitous network and society.

Ubiquitous networks could enable a convenient connection “anytime, anywhere, anything, anyone” to the information communications network. Yet, it is necessary for users to establish a highly secure and reliable environment in which they could enjoy ubiquitous digital services via ubiquitous network and connectivity. Establishing trustworthy ubiquitous network brings up some urgent and challenging issues.

In contrast to the cyberspace we have seen until now, the ubiquitous network will be capable of exchanging information more freely beyond the boundaries of time and distance. Unfortunately, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Contents protection & Digital Rights Management (DRM) have a tangible goal to safeguard the rights and benefits of multimedia contents owners, copyrights holders, digital services providers, and even consumers in contents value chain. Some applications research frontiers, related to contents security, have emerged in recent years. These include subjects on trustworthy networks and transactions, secure digital multimedia broadcasting and controlled contents sharing. Researchers, contents industry engineers and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.

This special session aims to bring together related research works in the realm of Ubiquitous Networks and Multimedia Contents Security, and further investigates and discusses trusted solutions and secure techniques for Ubiquitous Networks and Ubiquitous Computing, as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their Intellectual Property Rights and business benefits. In addition, novel ideas and research works from end consumers’ perspective, such as privacy, trustworthiness and multimedia contents sharing in ubiquitous network society, will be embraced by the session.

The TUN-MM Session topics include (but are not limited to) the following:

  • Ubiquitous Computing & Web Services

  • Ubiquitous Interactions and Mobile Systems

  • Ubiquitous Sensing

  • Mobile Social Networks and Context and Situational Awareness

  • IP, Privacy and Trust in Ubiquitous Networks

  • Networking and Technologies for Interactive Multimedia Services

  • Cloud-based Mobile Media System

  • Secure Digital Multimedia Broadcasting

  • Multimedia Contents Sharing & Risk Management

  • Multimedia Content Delivery

  • Enhanced QoS for Mobile Media

  • Contents Security & Protection in Multimedia Social Networks

  • Service-oriented Media Management

  • Digital Rights Management & Interoperability

  • Methodologies for Establishing Trust Among Unknown/Un-trusted Entities

  • Authentication, Authorization and Access Control in Ubiquitous Networks

  • Metrics and Measurement Schemes

  • Monitoring and Assessment

  • Performance Modeling and Simulation


You are invited to submit original and unpublished research works on above and other topics related to trusted ubiquitous networks and multimedia contents and protection. Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words. The full manuscript should be at most 8 pages using the two-column IEEE format. Additional pages will be charged at additional fee. Short papers (up to 4 pages), poster papers and posters (please refer to for the posters submission details) will also be accepted for submission. In case of multiple authors, an indication of which author(s) is responsible for correspondence must be indicated. Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments.

Authors are invited to submit a PDF copy of their manuscript to the workshop using the following link: . In the form you fill out, please indicate that the submission is for PEC 2014 in the Notes/Comments field of the uploading form. If the submission is for a poster paper or short paper, indicate that as well on the manuscript and in the form's Notes field.

Only PDF files will be accepted, uploaded to the link above. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, significance, contributions, technical clarity and presentation. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. Authors of accepted papers must guarantee that their papers will be registered and presented at the special session.


Accepted papers will be published in the conference proceedings. Instructions for final manuscript format and requirements will be posted on the HPCS 2014 Conference web site. It is our intent to have the proceedings formally published in hard and soft copies and be available at the time of the conference. The proceedings is projected to be included in the IEEE Digital Library and indexed in all major indexing services accordingly.

If you have any questions about paper submission or the special session, please contact the Special Session organizers.


For information or questions about Conference's paper submission, tutorials, posters, workshops, special sessions, exhibits, demos, panels and forums organization, doctoral colloquium, and any other information about the conference location, registration, paper formatting, etc., please consult the Conference’s web site at URL: or or contact one of the Conference's organizers.