STM 2012 - 8th International Workshop on Security and Trust Management
Topics/Call fo Papers
STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2012 is the eighth workshop in this series and will be held in Pisa, Italy, in conjunction with ESORICS 2012 (17th European Symposium on Research in Computer Security).
Topics of interest include, but are not limited to:
- access control
- cryptography
- digital right management
- economics of security
- key management
- ICT for securing digital as well as physical assets
- identity management
- networked systems security
- privacy and anonymity
- reputation systems and architectures
- security and trust management architectures
- semantics and computational models for security
and trust
- trust assessment and negotiation
- trust in mobile code
- trust in pervasive environments
- trust models
- trust management policies
- trusted platforms and trustworthy systems
- trustworthy user devices
*Program Committee Members (Tentative)
Rafael Accorsi University of Freibourg, Germany
Isaac Agudo University of Malaga, Spain
Alessandro Armando University of Genova, Italy
Jim Clarke WIT, Ireland
Jason Crampton Royal Holloway, University of London, UK
Jorge Cuellar Siemens, Germany
Sabrina de Capitani Università degli Studi di Milano, Italy
Simon Foley University College Cork, Ireland
Martin Huth Imperial College, London, USA
Sushil Jajodia George Mason University, USA
Martin Johns SAP Research, Germany
Aaron Johnson University of Texas, USA
Guenter Karjoth IBM Research, Switzerland
Ninghui Li Purdue University, USA
Javier Lopez Univeristy of Malaga, Spain
Fabio Martinelli CNR, Italy
Sjouke Mauw University of Luxemburg, Luxemburg
Stig F. Mjolsnes NTNU, Norway
Dusko Pavlovic Kestrel Institute (USA) and Oxford University (UK)
Guenter Pernul University of Regensburg, Germany
Alex Pretschner Fraunhofer IESE, Germany
Pierangela Samarati Università degli Studi di Milano, Italy
Ketil Stoelen SINTEF, Norway
Topics of interest include, but are not limited to:
- access control
- cryptography
- digital right management
- economics of security
- key management
- ICT for securing digital as well as physical assets
- identity management
- networked systems security
- privacy and anonymity
- reputation systems and architectures
- security and trust management architectures
- semantics and computational models for security
and trust
- trust assessment and negotiation
- trust in mobile code
- trust in pervasive environments
- trust models
- trust management policies
- trusted platforms and trustworthy systems
- trustworthy user devices
*Program Committee Members (Tentative)
Rafael Accorsi University of Freibourg, Germany
Isaac Agudo University of Malaga, Spain
Alessandro Armando University of Genova, Italy
Jim Clarke WIT, Ireland
Jason Crampton Royal Holloway, University of London, UK
Jorge Cuellar Siemens, Germany
Sabrina de Capitani Università degli Studi di Milano, Italy
Simon Foley University College Cork, Ireland
Martin Huth Imperial College, London, USA
Sushil Jajodia George Mason University, USA
Martin Johns SAP Research, Germany
Aaron Johnson University of Texas, USA
Guenter Karjoth IBM Research, Switzerland
Ninghui Li Purdue University, USA
Javier Lopez Univeristy of Malaga, Spain
Fabio Martinelli CNR, Italy
Sjouke Mauw University of Luxemburg, Luxemburg
Stig F. Mjolsnes NTNU, Norway
Dusko Pavlovic Kestrel Institute (USA) and Oxford University (UK)
Guenter Pernul University of Regensburg, Germany
Alex Pretschner Fraunhofer IESE, Germany
Pierangela Samarati Università degli Studi di Milano, Italy
Ketil Stoelen SINTEF, Norway
Other CFPs
- IMS Global Learning Consortium Quarterly Meetings & Cloud and Open Standards Summit
- The 5th International Conference on Autonomous Infrastructure, Management and Security AIMS'2011
- Canadian Communication Association (CCA) Annual Conference 2011
- Webinar on Medical Device Tracking - Medical Devices Webinar By ComplianceOnline
- Medical Device Complaints Handling Strategies for Managing Your Biggest Compliance Challenge
Last modified: 2012-01-07 16:49:14