TRUST 2014 - 7th International Conference on Trust & Trustworthy Computing
Topics/Call fo Papers
TRUST 2014 is an international conference on the technical and socio-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.
Important dates:
Submission due: 7 March 2014
Notification: 7 April 2014
Camera ready: 21 April 2014
Conference: 30 June - 2 July 2014
The conference solicits original papers on any aspect (technical, social or socio-economic) of the design, application and usage of trusted and trustworthy computing. Papers can address design, application and usage of trusted and trustworthy computing in a broad range of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols.
Two types of submissions are solicited:
Full papers (up to 18 pages in LNCS format) that report on in-depth, mature research results
and
Short papers (up to 9 pages in LNCS format) that describe brief results or exciting work-in-progress
Topics of interest include, but are not limited to:
Technical Strand:
Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
Trust, Security and Privacy in embedded systems
Trust, Security and Privacy in social networks
Trusted mobile platforms and mobile phone security
Implementations of trusted computing (hardware and software)
Applications of trusted computing
Trustworthy infrastructures and services for cloud computing (including resilience)
Attestation and integrity verification
Cryptographic aspects of trusted and trustworthy computing
Design, implementation and analysis of security hardware
Security hardware with cryptographic and security functions, physically unclonable functions (PUFs)
Intrusion resilience in trusted computing
Virtualization for trusted platforms
Secure storage
Security policy and management of trusted computing
Access control for trusted platforms
Privacy aspects of trusted computing
Verification of trusted computing architectures
Usability and end-user interactions with trusted platforms
Limitations of trusted computing
Social and Socio-economic Strand:
The role of trust in human-computer interactions
Usability and user perceptions of trustworthy systems and risks
Patterns of trust practices in human-computer interactions
Effects of trustworthy systems upon user, corporate, and governmental behavior
The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
Game theoretical approaches to modeling or designing trustworthy systems
Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
Economic drivers for trustworthy systems in corporate environment
Experimental economics studies of trustworthiness
The interplay between privacy, privacy enhancing technologies and trustworthy systems
Evaluation of research methods used in the research of trustworthy and trusted computing
Critiques of trustworthy systems
Metrics of trust
Privacy Aspects of Trust Computing
Engineering Processes for Trustworthy Computing
Submissions must be in LNCS format subject to the page limits mentioned above. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.
All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.
General Chair:
Ioannis Askoxylakis, FORTH-ICS, GR
Program Chairs - Socio-economic Strand
Daniel J. Weitzner, MIT, US
Program Chairs - Technical Strand
Thorsten Holz, Ruhr-Uni?ver?si?ty Bo?chum, DE
Sotiris Ioannidis, FORTH, GR
Important dates:
Submission due: 7 March 2014
Notification: 7 April 2014
Camera ready: 21 April 2014
Conference: 30 June - 2 July 2014
The conference solicits original papers on any aspect (technical, social or socio-economic) of the design, application and usage of trusted and trustworthy computing. Papers can address design, application and usage of trusted and trustworthy computing in a broad range of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols.
Two types of submissions are solicited:
Full papers (up to 18 pages in LNCS format) that report on in-depth, mature research results
and
Short papers (up to 9 pages in LNCS format) that describe brief results or exciting work-in-progress
Topics of interest include, but are not limited to:
Technical Strand:
Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
Trust, Security and Privacy in embedded systems
Trust, Security and Privacy in social networks
Trusted mobile platforms and mobile phone security
Implementations of trusted computing (hardware and software)
Applications of trusted computing
Trustworthy infrastructures and services for cloud computing (including resilience)
Attestation and integrity verification
Cryptographic aspects of trusted and trustworthy computing
Design, implementation and analysis of security hardware
Security hardware with cryptographic and security functions, physically unclonable functions (PUFs)
Intrusion resilience in trusted computing
Virtualization for trusted platforms
Secure storage
Security policy and management of trusted computing
Access control for trusted platforms
Privacy aspects of trusted computing
Verification of trusted computing architectures
Usability and end-user interactions with trusted platforms
Limitations of trusted computing
Social and Socio-economic Strand:
The role of trust in human-computer interactions
Usability and user perceptions of trustworthy systems and risks
Patterns of trust practices in human-computer interactions
Effects of trustworthy systems upon user, corporate, and governmental behavior
The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
Game theoretical approaches to modeling or designing trustworthy systems
Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
Economic drivers for trustworthy systems in corporate environment
Experimental economics studies of trustworthiness
The interplay between privacy, privacy enhancing technologies and trustworthy systems
Evaluation of research methods used in the research of trustworthy and trusted computing
Critiques of trustworthy systems
Metrics of trust
Privacy Aspects of Trust Computing
Engineering Processes for Trustworthy Computing
Submissions must be in LNCS format subject to the page limits mentioned above. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.
All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.
General Chair:
Ioannis Askoxylakis, FORTH-ICS, GR
Program Chairs - Socio-economic Strand
Daniel J. Weitzner, MIT, US
Program Chairs - Technical Strand
Thorsten Holz, Ruhr-Uni?ver?si?ty Bo?chum, DE
Sotiris Ioannidis, FORTH, GR
Other CFPs
- 6th International Conference on e-Infrastructure and e-Services for Developing Countries
- The 20th IEEE Pacific Rim International Symposium on Dependable Computing
- 2014 Conférence d'Apprentissage Automatique
- 11th International Conference on Mobile and Ubiquitous Systems
- 9th International Conference on Body Area Networks
Last modified: 2014-02-07 22:06:40