| |||||||||||||
STM 2015 : 11th International Workshop on Security and Trust ManagementConference Series : Security and Trust Management | |||||||||||||
Link: http://stm2015.di.unimi.it | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
CALL FOR PAPERS
****************************************************************************** 11th International Workshop on Security and Trust Management (STM 2015) Vienna, Austria - September 21-22, 2015 http://stm2015.di.unimi.it ****************************************************************************** STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2015 is the eleventh workshop in this series and will be held in Vienna, Austria, in conjunction with the 20th European Symposium On Research in Computer Security (ESORICS 2015). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs. Topics of interest include, but are not limited to: - Access control - Anonymity - Applied cryptography - Authentication - Complex systems security - Data and application security - Data protection - Data/system integrity - Digital right management - Economics of security and privacy - Formal methods for security and trust - Identity management - Legal and ethical issues - Mobile security - Networked systems security - Operating systems security - Privacy - Security and trust metrics - Security and trust policies - Security and trust management architectures - Security and trust for big data - Security and trust in cloud environments - Security and trust in content delivery networks - Security and trust in crowdsourcing - Security and trust in grid computing - Security and trust in the Internet of Things - Security and trust in pervasive computing - Security and trust in services - Security and trust in social networks - Social implications of security and trust - Trust assessment and negotiation - Trust in mobile code - Trust models - Trust management policies - Trust and reputation systems - Trusted platforms - Trustworthy systems and user devices SUBMISSION INSTRUCTIONS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages, including the bibliography and well-marked appendices, and should follow the LNCS style. Submissions are to be made to the submission web site at https://www.easychair.org/conferences/?conf=stm2015. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of June 16, 2015 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop. The proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series. IMPORTANT DATES Paper submission due: June 16, 2015 (11:59 PM American Samoa time) Notification to authors: July 23, 2015 Camera ready due: August 1, 2015 PROGRAM CHAIR Sara Foresti Universita` degli Studi di Milano, Italy PUBLICITY CHAIR Giovanni Livraga Universita` degli Studi di Milano, Italy PROGRAM COMMITTEE To be announced If you have any question, please contact the organizers at stm2015@unimi.it |
|