Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    TRUST 2012 - 5th International Conference on Trust and Trustworthy Computing

    View: 3461

    Website http://www.trust.sba-research.org/index.html | Want to Edit it Edit Freely

    Category trust; security; privacy; hardware; software; applications; verification; cryptographic; trustworthy; virtualization; forensics; trustworthiness

    Deadline: February 22, 2012 | Date: June 13, 2012-June 15, 2012

    Venue/Country: Vienna, Austria

    Updated: 2011-11-25 22:51:29 (GMT+9)

    Call For Papers - CFP

    TRUST 2012 is an international conference on the technical and soci-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.

    Building on the success of TRUST 2011 (held in Pittsburgh, USA) and TRUST 2010 (held in Berlin, Germany) TRUST 2009 (held in Oxford, UK), this conference focuses on trusted and trustworthy computing, both from the technical and social perspectives. The conference itself has two main strands, one devoted to technical aspects and one devoted to the socio-economic aspects of trusted computing.

    Important dates:

    Submission due: 22 February 2012, 23:59 UTC

    Notification: 25 March 2012

    Camera ready: 09 April 2012

    Conference: 13-15 June 2012

    The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to:

    Technical Strand:

    Architecture and implementation technologies for trusted platforms and trustworthy infrastructures

    Trust, Security and Privacy in embedded systems

    Trust, Security and Privacy in social networks

    Trusted mobile platforms and mobile phone security

    Implementations of trusted computing (hardware and software)

    Applications of trusted computing

    Trustworthy infrastructures and services for cloud computing (including resilience)

    Attestation and integrity verification

    Cryptographic aspects of trusted and trustworthy computing

    Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs)

    Intrusion resilience in trusted computing

    Virtualization for trusted platforms

    Secure storage

    Security policy and management of trusted computing

    Access control for trusted platforms

    Privacy aspects of trusted computing

    Verification of trusted computing architectures

    Usability and end-user interactions with trusted platforms

    Limitations of trusted computing

    Socio-economic Strand:

    Usability and user perceptions of trustworthy systems and risks

    Effects of trustworthy systems upon user, corporate, and governmental behavior

    Economic drivers for trustworthy systems in corporate environment

    The impact of trustworthy systems in enhancing trust in cloud-like infrastructures

    The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight

    The impact of trustworthy systems upon digital forensics, police investigations and court proceedings

    Game theoretical approaches to modeling or designing trustworthy systems

    Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space

    Experimental economics studies of trustworthiness

    The interplay between privacy, privacy enhancing technologies and trustworthy systems

    Critiques of trustworthy systems

    Submissions must be at most 18 pages in LNCS format. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.

    All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.

    Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.