| |||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||
All CFPs on WikiCFP | |||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||
Present CFP : 2012 | |||||||||||||||||||||||||||||||||||||||
Built on the continuous success of ACM STC 2006-2011, this workshop focuses on fundamental technologies of trusted and high assurance computing and its applications in large-scale systems with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues.
The workshop solicits two types of original papers: full papers and short/work-in-progress/position-papers. Submitted papers must be in ACM double-column format with at most 12 pages (full paper) and 6 pages (short paper), including bibliography, appendix etc. Note that reviewers are not required to read the appendix. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to: security policies and models of trusted computing architecture and implementation technologies for trusted platform limitations, alternatives and tradeoffs regarding trusted computing trusted computing in cloud and data center cloud-based attestation services trusted smartphone devices and systems trust in smart grid, energy, and Internet of Things trusted emerging and future Internet infrastructure trusted online social network trust in authentications, users and computing services hardware based trusted computing software based trusted computing pros and cons of hardware based approach remote attestation of trusted devices censorship-freeness in trusted computing cryptographic support in trusted computing case study in trusted computing principles for handling scales scalable trust supports and services in cloud trusted embedded computing and systems virtualization and trusted computing | |||||||||||||||||||||||||||||||||||||||
|