STM 2013 - 9th International Workshop on Security and Trust Management (STM 2013)
Topics/Call fo Papers
The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.
Topics of interest include but are not limited to:
Access control E-services
Anonymity Formal methods for security and trust
Applied cryptography Identity management
Authentication Legal and ethical issues
Complex systems security Networked systems security
Data and application security Operating systems security
Data protection Privacy
Data and system integrity Security and trust metrics
Digital right management Security and trust policies
Economics of security and privacy Security and trust mngmt. architectures
Security and trust in cloud environments Security and trust in grid computing
Security and trust in pervasive computing Security and trust in social networks
Social implications of security and trust Trust assessment and negotiation
Trust in mobile code Trust models
Trust management policies Trust and reputation systems
Trusted platforms Trustworthy systems and user devices
Web services security
Topics of interest include but are not limited to:
Access control E-services
Anonymity Formal methods for security and trust
Applied cryptography Identity management
Authentication Legal and ethical issues
Complex systems security Networked systems security
Data and application security Operating systems security
Data protection Privacy
Data and system integrity Security and trust metrics
Digital right management Security and trust policies
Economics of security and privacy Security and trust mngmt. architectures
Security and trust in cloud environments Security and trust in grid computing
Security and trust in pervasive computing Security and trust in social networks
Social implications of security and trust Trust assessment and negotiation
Trust in mobile code Trust models
Trust management policies Trust and reputation systems
Trusted platforms Trustworthy systems and user devices
Web services security
Other CFPs
- The International Conference on Applied and Theoretical Information Systems Research
- Fifth Workshop on Energy-Efficient Design ( WEED 2013 )
- Third Workshop on Architectures and Systems for Big Data
- 25th International Conference on Database and Expert Systems Applications
- First DEXA Workshop on Development of Applications for Next Generation High Performance Systems
Last modified: 2013-05-03 12:15:38