Receive Latest News
ourGlocal service has experienced some issues yesterday. Now the system has been restored.
We sincerely regret the inconvenience caused by the temporary service suspension and greatly appreciate the patience of our valued users until the service is restored.
Dec 1, 2015
TRUST 2012 - 5th International Conference on Trust and Trustworthy Computing
Website http://www.trust.sba-research.org/index.html |
Category trust; security; privacy; hardware; software; applications; verification; cryptographic; trustworthy; virtualization; forensics; trustworthiness;
Deadline: February 22, 2012 | Date: June 13, 2012-June 15, 2012
Venue/Country: Vienna, Austria
Updated: 2011-11-25 22:51:29 (GMT+9)
Call For Papers - CFPTRUST 2012 is an international conference on the technical and soci-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.Building on the success of TRUST 2011 (held in Pittsburgh, USA) and TRUST 2010 (held in Berlin, Germany) TRUST 2009 (held in Oxford, UK), this conference focuses on trusted and trustworthy computing, both from the technical and social perspectives. The conference itself has two main strands, one devoted to technical aspects and one devoted to the socio-economic aspects of trusted computing.Important dates:Submission due: 22 February 2012, 23:59 UTCNotification: 25 March 2012Camera ready: 09 April 2012 Conference: 13-15 June 2012The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to:Technical Strand:Architecture and implementation technologies for trusted platforms and trustworthy infrastructuresTrust, Security and Privacy in embedded systemsTrust, Security and Privacy in social networksTrusted mobile platforms and mobile phone securityImplementations of trusted computing (hardware and software)Applications of trusted computingTrustworthy infrastructures and services for cloud computing (including resilience)Attestation and integrity verificationCryptographic aspects of trusted and trustworthy computingDesign, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs) Intrusion resilience in trusted computingVirtualization for trusted platformsSecure storageSecurity policy and management of trusted computingAccess control for trusted platformsPrivacy aspects of trusted computingVerification of trusted computing architecturesUsability and end-user interactions with trusted platformsLimitations of trusted computingSocio-economic Strand:Usability and user perceptions of trustworthy systems and risksEffects of trustworthy systems upon user, corporate, and governmental behaviorEconomic drivers for trustworthy systems in corporate environmentThe impact of trustworthy systems in enhancing trust in cloud-like infrastructuresThe adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversightThe impact of trustworthy systems upon digital forensics, police investigations and court proceedingsGame theoretical approaches to modeling or designing trustworthy systemsApproaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal spaceExperimental economics studies of trustworthinessThe interplay between privacy, privacy enhancing technologies and trustworthy systemsCritiques of trustworthy systemsSubmissions must be at most 18 pages in LNCS format. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.