| |||||||||||||
STC 2008 : The Third ACM Workshop on Scalable Trusted ComputingConference Series : Scalable Trusted Computing | |||||||||||||
Link: http://www.sisa.samsung.com/innovation/stc08 | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
The Third ACM Workshop on Scalable Trusted Computing
(ACM STC?08) (held in conjunction with the ACM CCS'08) http://www.sisa.samsung.com/innovation/stc08 Friday Oct 31, 2008 George Mason University Fairfax, Virginia, USA Built on the continuous success of ACM STC'06 and STC'07, this workshop focuses on fundamental technologies of trusted computing and its applications in large-scale systems -- those involving large number of users and parties with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. The workshop solicits two types of original papers that are single-column using at least 11pt fonts. The length of the full-paper submissions is at most 15 pages excluding bibliography, appendix etc. The total number of pages should not be more than 20, whereas the reviewers are not required to read the appendix. The length of short/work-in-progress/position-paper submissions is at most 8 pages excluding bibliography. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to: * security policies and models of trusted computing * architecture and implementation technologies for trusted platform * limitations, alternatives and tradeoffs regarding trusted computing * trust in authentications, users and computing services * hardware based trusted computing * software based trusted computing * pros and cons of hardware based approach * remote attestation of trusted devices * censorship-freeness in trusted computing * cryptographic support in trusted computing * case study in trusted computing * applications of trusted computing * intrusion resilience in trusted computing * access control for trusted computing * principles for handling scales * scalable trust supports and services * trusted embedded computing and systems * trusted computing in networks and distributed systems * virtualization and trusted computing General Chair: Shouhuai Xu University of Texas, San Antonio PC Co-chairs: Jean-Pierre Seifert Samsung Information Systems America Cristina Nita-Rotaru Purdue University Program Committee: N. Asokan Nokia Research Ken Birman Cornell University Trent Jaeger Penn State University Xuxian Jiang George Masson University Klaus Kursawe Philips Research Ninghui Li Purdue University Peter Loscocco National Security Agency Wenbo Mao EMC Labs David Naccache ENS Paris Ahmad-Reza Sadeghi Ruhr-University Bochum Ravi Sandhu University of Texas, San Antonio Sean Smith Dartmouth College Leendert van Doorn AMD Paulo Verissimo University of Lisboa Dongyan Xu Purdue University Lidong Zhou Microsoft Research Xinwen Zhang Samsung Information System America Important Dates: Submission due: June 16, 2008 Notification: July 28, 2008 Camera ready: Aug. 10, 2008 (firm) STC workshop: Oct. 31, 2008 CCS conference: Oct. 27 - 31, 2008 Paper Submission: http://www.easychair.org/conferences/?conf=stc08 |
|