TwC 2013 - The 4th International Workshop on Trustworthy Computing (TwC-2013)
Topics/Call fo Papers
Computers reside at the heart of systems on which people now rely, both in critical national infrastructures and in their homes, cars, and offices. Today, many of these systems are far too vulnerable to cyber attacks that can inhibit their operation, corrupt valuable data, or expose private information. Future systems will include sensors and computers everywhere, exacerbating the attainment of security and privacy. Current security practices largely address current and known threats, but there is a need for research to take account of future threats.
We encourage contributions describing innovative work on TwC. The topics of interest include but are not limited to:
Security of next generation Operating Systems
Secure and resilient network protocols
Theoretical foundations and mechanisms for privacy, security, trust
Human computer interface for security functions
Vulnerabilities of existing protocols and applications
Key distribution/management
Intrusion detection and response
Secure protocol configuration and deployment
Improved ability to certify system security properties
Improved ability to analyze security designs, build systems correctly
More effective system monitoring, anomaly detection, attack recognition and defense
Integrating hardware and software for security
For further information, please contact the workshop co-chairs.
Important Dates
Submission deadline: March 1, 2013
Authors Notification: May 1, 2013
Authors Registration: May 15, 2013
Final Manuscript: May 25, 2013
Workshop dates: September 4 - 6, 2013
Questions? Email to durresi-AT-cs.iupui.edu
We encourage contributions describing innovative work on TwC. The topics of interest include but are not limited to:
Security of next generation Operating Systems
Secure and resilient network protocols
Theoretical foundations and mechanisms for privacy, security, trust
Human computer interface for security functions
Vulnerabilities of existing protocols and applications
Key distribution/management
Intrusion detection and response
Secure protocol configuration and deployment
Improved ability to certify system security properties
Improved ability to analyze security designs, build systems correctly
More effective system monitoring, anomaly detection, attack recognition and defense
Integrating hardware and software for security
For further information, please contact the workshop co-chairs.
Important Dates
Submission deadline: March 1, 2013
Authors Notification: May 1, 2013
Authors Registration: May 15, 2013
Final Manuscript: May 25, 2013
Workshop dates: September 4 - 6, 2013
Questions? Email to durresi-AT-cs.iupui.edu
Other CFPs
- The 3rd International Workshop on Information Networking and Wireless Communications (INWC-2013)
- The 7th International Workshop on Advanced Distributed and Parallel Network Applications (ADPNA-2013)
- The 2nd International Workshop on Web Services and Social Media (WSSM-2013)
- The 4th International Workshop on Heterogeneous Networking Environments and Technologies (HETNET-2013)
- The 2nd International Workshop on Cyber-Physical Systems, Applications and Technologies (CPSAT-2013)
Last modified: 2012-12-30 08:40:52