STM 2015 - 11th International Workshop on Security and Trust Management
Date2015-09-21 - 2015-09-22
Deadline2015-06-16
VenueVienna, Austria
Keywords
Websitehttps://stm2015.di.unimi.it
Topics/Call fo Papers
Workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs. Topics of interest include, but are not limited to:
Access control Mobile security Security and trust in the Internet of Things
Anonymity Networked systems security Security and trust in pervasive computing
Applied cryptography Operating systems security Security and trust in services
Authentication Privacy Security and trust in social networks
Complex systems security Security and trust metrics Social implications of security and trust
Data and application security Security and trust policies Trust assessment and negotiation
Data protection Security and trust management architectures Trust in mobile code
Data/system integrity Security and trust for big data Trust models
Digital right management Security and trust in cloud environments Trust management policies
Economics of security and privacy Security and trust in content delivery networks Trust and reputation systems
Formal methods for security and trust Security and trust in crowdsourcing Trusted platforms
Identity management Security and trust in grid computing Trustworthy systems and user devices
Access control Mobile security Security and trust in the Internet of Things
Anonymity Networked systems security Security and trust in pervasive computing
Applied cryptography Operating systems security Security and trust in services
Authentication Privacy Security and trust in social networks
Complex systems security Security and trust metrics Social implications of security and trust
Data and application security Security and trust policies Trust assessment and negotiation
Data protection Security and trust management architectures Trust in mobile code
Data/system integrity Security and trust for big data Trust models
Digital right management Security and trust in cloud environments Trust management policies
Economics of security and privacy Security and trust in content delivery networks Trust and reputation systems
Formal methods for security and trust Security and trust in crowdsourcing Trusted platforms
Identity management Security and trust in grid computing Trustworthy systems and user devices
Other CFPs
- International Conference Numerical Methods and Applied Mathematics (NMAM2016)
- Hird International Conference on Artificial Intelligence and Pattern Recognition (AIPR2016)
- Third International Conference on Computer Science, Computer Engineering, and Education Technologies (CSCEET2016)
- Third International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2016)
- Second International Conference on Electrical and Biomedical Engineering, Clean Energy and Green Computing (EBECEGC2015)
Last modified: 2015-04-08 22:41:15