Home page logo
/

educause logo Educause Security Discussion mailing list archives

Invitation to submit a paper to TRUST 2013
From: Conference <conference () SBA-RESEARCH ORG>
Date: Wed, 19 Dec 2012 16:11:04 +0100

Dear all,



We would like to invite you to submit a paper to the 6th International
Conference on Trust and Trustworthy Computing which will take place at the
Imperial College London in London (United Kingdom) 17th-19th of June 2013.



TRUST 2013 is an international conference on the technical and
socio-economic aspects of trustworthy infrastructures. It provides an
excellent interdisciplinary forum for researchers, practitioners, and
decision makers to explore new ideas and discuss experiences in building,
designing, using and understanding trustworthy computing systems.



http://trust2013.sba-research.org/

Important dates:

●     Submission due: 15 February 2013 23:59 UTC

●     Notification: 22 March 2013

●     Camera ready: 10 April 2013

●     Conference: 17-19 June 2013



The conference solicits original papers on any aspect (technical, social or
socio-economic) of the design, application and usage of trusted and
trustworthy computing. Papers can address design, application and usage of
trusted and trustworthy computing in a broad range of concepts including,
but not limited to, trustworthy infrastructures, cloud computing, services,
hardware, software and protocols.



Two types of submissions are solicited:

●     Full papers (up to 18 pages in LNCS format) that report on in-depth,
mature research results

and

●     Short papers (up to 9 pages in LNCS format) that describe brief
results or exciting work-in-progress



Topics of interest include, but are not limited to:



Technical Strand:

●     Architecture and implementation technologies for trusted platforms
and trustworthy infrastructures

●     Trust, Security and Privacy in embedded systems

●     Trust, Security and Privacy in social networks

●     Trusted mobile platforms and mobile phone security

●     Implementations of trusted computing (hardware and software)

●     Applications of trusted computing

●     Trustworthy infrastructures and services for cloud computing
(including resilience)

●     Attestation and integrity verification

●     Cryptographic aspects of trusted and trustworthy computing

●     Design, implementation and analysis of security hardware

●     Security hardware with cryptographic and security functions,
physically unclonable functions (PUFs)

●     Intrusion resilience in trusted computing

●     Virtualization for trusted platforms

●     Secure storage

●     Security policy and management of trusted computing

●     Access control for trusted platforms

●     Privacy aspects of trusted computing

●     Verification of trusted computing architectures

●     Usability and end-user interactions with trusted platforms

●     Limitations of trusted computing



Social and Socio-economic Strand:

・      The role of trust in human-computer interactions

・      Usability and user perceptions of trustworthy systems and risks

・      Patterns of trust practices in human-computer interactions

・      Effects of trustworthy systems upon user, corporate, and
governmental behavior

・      The impact of trustworthy systems in enhancing trust in cloud-like
infrastructures

・      The adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and government
oversight

・      The impact of trustworthy systems upon digital forensics, police
investigations and court proceedings

・      Game theoretical approaches to modeling or designing trustworthy
systems

・      Approaches to model and simulate scenarios of how trustworthy
systems would be used in corporate environments and in personal space

・      Economic drivers for trustworthy systems in corporate environment

・      Experimental economics studies of trustworthiness

・      The interplay between privacy, privacy enhancing technologies and
trustworthy systems

・      Evaluation of research methods used in the research of trustworthy
and trusted computing

・      Critiques of trustworthy systems

・      Metrics of trust

・      Privacy Aspects of Trust Computing

・      Engineering Processes for Trustworthy Computing





Submissions:

Submissions must be in
<http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0> LNCS format
subject to the page limits mentioned above. No changes to margins, spacing,
or font sizes (or anything else) are allowed from those specified. We
reserve the right to request the source files for a submission to verify
compliance with this requirement. Only PDF files will be accepted. Papers
must be written in English.



All submissions must be anonymized. An author's name should occur only in
references to that author's related work, which should be referenced in the
third person and not overtly distinguishable from the referenced work of
others.



Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal, conference or
workshop. Simultaneous submission of the same work is not allowed. Authors
of accepted papers must guarantee that their papers will be presented at the
conference.

To submit a paper please visit our Submission Site
http://trust2013.sba-research.org/?page_id=17



General Chair:

Michael Huth, Imperial College London, UK

Program Chairs:




Socio-economic Strand:



・         Lizzie Coles-Kemp (Royal Holloway University of London, UK)

・         Ivan Flechais (University of Oxford, UK)



Technical Strand:

・         Srdjan Capkun (ETH Zurich, Switzerland)

・         N. Asokan (University of Helsinki)

##########################



We are looking forward to your contribution!



With kind regards,



Your TRUST 2013 Conference Team







Attachment: CfP_TRUST_2013.pdf
Description:


  By Date           By Thread  

Current thread:
  • Invitation to submit a paper to TRUST 2013 Conference (Dec 19)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault