SysTEX 2016 - 1st Workshop on System Software for Trusted Execution (SysTEX 2016)
Topics/Call fo Papers
With the advent of novel hardware extensions that enable fine-grained and flexible trusted execution, appropriate system software needs to be provided to make these features conveniently accessible to application developers. The 1st Workshop on System Software for Trusted Execution will focus on system software and middleware that puts novel hardware for trusted execution in use and highlights how possible additional hardware features will enable the implementation of trustworthy systems.
Topics of interest include but are not limited to:
Architecture, applications and implementation technologies for trusted platforms and trustworthy infrastructures
Middleware for distributed trusted execution
OS support for trusted execution
Trustworthy infrastructures and services for cloud computing (including resilience)
Attestation and integrity verification
Cryptographic aspects of trusted and trustworthy computing
Intrusion resilience in trusted computing
Virtualization for trusted platforms
Security policy and management of trusted computing
Privacy aspects of trusted computing
Verification of trusted computing architectures
Usability and end-user interactions with trusted platforms
Limitations of trusted computing
Usability and user perceptions of trustworthy systems and risks
Use case studies of trusted execution
Validation and performance evaluation of trusted hardware
Topics of interest include but are not limited to:
Architecture, applications and implementation technologies for trusted platforms and trustworthy infrastructures
Middleware for distributed trusted execution
OS support for trusted execution
Trustworthy infrastructures and services for cloud computing (including resilience)
Attestation and integrity verification
Cryptographic aspects of trusted and trustworthy computing
Intrusion resilience in trusted computing
Virtualization for trusted platforms
Security policy and management of trusted computing
Privacy aspects of trusted computing
Verification of trusted computing architectures
Usability and end-user interactions with trusted platforms
Limitations of trusted computing
Usability and user perceptions of trustworthy systems and risks
Use case studies of trusted execution
Validation and performance evaluation of trusted hardware
Other CFPs
- Second International Workshop on Smart Cities: People, Technology and Data
- The 3d Workshop on Middleware for Context-Aware Applications in the IoT (M4IOT 2016)
- First International Workshop on Mashups of Things and APIs
- 1st Workshop on Middleware for Edge Clouds & Cloudlets (MECC 2016)
- International Conference on Civil, Architecture and Sustainable Development (CASD-2016)
Last modified: 2016-07-10 21:16:56