| |||||||||||||||
IFIPTM 2010 : 4th IFIP International Conference on Trust ManagementConference Series : IFIP Trust Management | |||||||||||||||
Link: http://www.ifip-tm2010.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
====== IFIPTM 2010 ===== Call For Papers =====
Fourth IFIP International Conference on Trust Management Morioka, Japan, June 16-18, 2010 http://www.ifip-tm2010.org/ Important dates - Papers: * Submission deadline: January 9, 2010 * Notification of acceptance: February 26, 2010 * Camera-ready due: March 5, 2010 - Posters and Demonstrations: * Submission deadline: February 26, 2010 * Notification of acceptance: March 26, 2010 - Tutorials and Workshops: * Submission deadline: January 15, 2010 * Notification of acceptance: February 1, 2010 IFIPTM2010 Events: Regular paper sessions Short paper sessions Poster presentations Demonstrations Tutorials Workshops The 4th IFIP International Conference on Trust Management (IFIPTM2010) will be held in Asia for the first time, in Japan, in the city of Morioka, Iwate, from June 16 to 18, 2010, in cooperation of Information Processing Society of Japan (IPSJ), supported by National Institute of Information and Communication Technology (NICT) and Information-Technology Promotion Agency (IPA), Japan. The mission of the IFIPTM 2010 Conference is to share research solutions to problems of Trust and Trust management, including related Security and Privacy issues, and to identify new issues and directions for future research and development work. IFIPTM 2010 invites submissions presenting novel research on all topics related to Trust, Security and Privacy, including but not limited to those listed below: * Trust models, formalization, specification, analysis and reasoning * Reputation systems and architectures * Engineering of trustworthy and secure software * Ethics, sociology and psychology of trust * Security management and usability issues including security configuration * Trust management frameworks for secure collaborations * Language security * Security, trust and privacy for service oriented architectures and composite applications * Security, trust and privacy for software as a service (SaaS) * Security, trust and privacy for Web 2.0 Mashups * Security, privacy, and trust as a service * Legal issues related to the management of trust * Semantically-aware security management * Adaptive security policy management * Mobile security * Anonymity and privacy vs. accountability * Critical infrastructure protection, public safety and emergency management * Privacy and identity management in e-services * Biometrics, national ID cards, identity theft * Robustness of trust and reputation systems * Distributed trust and reputation management systems * Human computer interaction aspects of privacy, security & trust * Applications of trust and reputation management in e-services * Trusted platforms and trustworthy systems IFIPTM 2010 welcomes submissions of papers on any topic related to the IFIPT TM themes of trust, security and privacy and the topics mentioned above. Submitted papers must not exceed 16 pages in length, including bibliography and well-marked appendices. Submission will be through the IFIPTM 2010 website. Please use the LNCS templates and style files available from http://www.springer.com/computer/lncs?SGWID=0-164-7-72377-0 . Accepted full papers will be published in the conference proceedings, to be published by Springer in the series of gIFIP Advances in Information and Communication Technology (AICT)under the auspices of the IFIP WG 11.11 on Trust Management. Submissions must be in English and conform to the "Springer LNCS Series" format since the IFIP AICT templates are not yet fully ready. Papers accepted as short papers will be presented at the IFIPTM2010 main conference. Short papers will be limited to 8 pages in length (including bibliography and well-marked appendices), and will be published in locally printed proceedings with an official ISSN number. See details below regarding the submission of posters, tutorials, demonstrations and proposals for organizing specialized workshops, ________________________ Call for Posters IFIPTM 2010 welcomes submissions of posters that focus on any relevant topic under the theme Trust, Security and Privacy. Posters can e.g. present student projects (Bachelor, Masterfs or PhD) or any other relevant study, idea or project. Posters should be visually easy to read, e.g. combining text and diagrams for illustration instead of only text. Posters will be presented in poster-style (i.e. interactive presentation) at the IFIPTM 2010 demo booth. Posters should be a single page with max size in A0 format, portrait or landscape. The accompanying poster paper should be formatted using the same format as specified for main conference papers, and should not exceed 4 pages in length including bibliography and well-marked appendices. Poster papers will be published in locally printed proceedings with an official ISSN number. Poster presenters should bring their own A1 formatted poster to the conference venue on the poster presentation date. Important dates: * Submission deadline: February 26, 2010 * Notification of acceptance: March 26, 2010 * Camera-ready poster papers due: April 30, 2010 ________________________ Call for Demonstrations Demonstrations should demonstrate to attendees, innovative solutions to major and significant topics addressed by the conference. Demonstrations should exhibit new research results and projects, industrial products, explore new business models, or illustrate new governmental frameworks and policies. They should allow members of the community to interactively discover and explore new paradigms or solutions through motivated examples. A description of the demonstration must be submitted as a document of up to 4 pages in length. The description can consist of slides, in which case 8 slides (assuming 2 slides per page) is the maximum length. Demonstrator Proposals: * Submission deadline: February 26, 2010 * Notification of acceptance: March 5, 2010 * Camera-ready of demonstration description due: April 30, 2010 * Demonstrations: June 17-18, 2010 ________________________ Call for Tutorials Tutorials should survey, explain and discuss research works and projects, industrial products and markets, or governmental frameworks and policies. They should allow members of the community to interactively gain specialist knowledge or skills, discover new paradigms or problematics through motivated examples, compare existing approaches and concepts, and possibly put them in practice. Tutorials should cover a varied range of issues and not be used to promote a single research approach or a product. Tutorial descriptions should consist of the title, abstract, contents, target audience, and tutor bio. Tutorial Proposals: * Submission deadline: January 15, 2010 * Notification of acceptance: February 1, 2010 * Tutorial notes due: May 10, 2010 * Tutorials: June 14-15, 2010 __________________________ Call for Workshops Workshops should stimulate and facilitate an atmosphere of active and constructive exchange on current issues of interest. They should allow members of the community to compare and discuss approaches, methods, and concepts about specific topics addressed by the conference. Workshop Proposals: * Submission deadline: January 15, 2010 * Notification of acceptance: February 1, 2010 * Camera-ready of workshop papers due: April 30, 2010 * Workshops: June 14-15, 2010 _______________________ === Organizing Committee === Conference Co-chairs: * Yuko Murayama, Iwate Prefectural University, Japan * Stephen Marsh, Communications Research Centre, Canada Technical program Co-chairs: * Audun Josang, University of Oslo, Norway * Masakatsu Nishigaki, Shizuoka University, Japan Advisory Committee: * Yoichi Shinoda, National Institute of Information and Communications Technology (NICT), Japan * Ryoichi Sasaki, Tokyo Denki University, Japan * Eiji Okamoto, University of Tsukuba, Japan * Koji Nakao, KDDI Corp., Japan * Katsuya Uchida, Institute of Information Security, Japan * Kenzo Itoh, Iwate Prefectural University, Japan Workshop Co-chairs: * Justin Zhan, CMU, U.S.A * Hiroaki Kikuchi, Tokai University, Japan Tutorial Chair: * Ayako Komatsu, Information-Technology Promotion Agency (IPA), Japan Demonstration Chair: * Katsumi Takahashi, NTT Corp., Japan Publications Co-chairs: * Tetsutaro Uehara, Kyoto University, Japan * Kanta Matsuura, The University of Tokyo, Japan Local Organization Co-chairs: * Yasuhiro Fujihara, Iwate Prefectural University, Japan * Norihisa Segawa, Iwate Prefectural University, Japan Registration Co-chairs: * Masato Terada, Hitachi Ltd., Japan * Toyoo Takata, Iwate Prefectural University, Japan Publicity Co-chairs: * Yuji SUGA, Internet Initiative Japan Inc. (IIJ), Japan * Hidema Tanaka, National Institute of Information and Communications Technology (NICT), Japan Liaison Co-chairs: * Masayuki Terada, NTT Docomo, Inc., Japan * Kozo Noaki, NTT Docomo, Inc., Japan Website Co-chairs: * Yoshia Saito, Iwate Prefectural University, Japan * Kentarou Yamaguchi, Institute of Information Security, Japan ________________________ === Program Committee === * Elisa Bertino, Purdue University, USA * Gary Bolton, Pennsylvania State University, USA * L. Jean Camp, Indiana University at Bloominton, USA * Licia Capra, University College London, UK * Cristiano Castelfranchi, ISTC-CNR, Italy * Christian Damsgaard Jensen, Technical University of Denmark, Denmark * Anupam Datta, Carnegie Mellon University, USA * Chrysanthos Dellarocas, University of Maryland, USA * Theo Dimitrakos, BT Innovate & Design, UK * Pierpaolo Dondio, Trinity College Dublin, Ireland * Naranker Dulay, Imperial College London, UK * Sandro Etalle, T.U. Eindhoven and University of Twente, The Netherlands * Rino Falcone, ISTC-CNR, Italy * Elena Ferrari, University of Insubria, Italy * Giusella Finocchiaro, University of Bologna, Italy * Jennifer Golbeck, University of Maryland, USA * Dieter Gollmann, Hamburg University of Technology, Germany * Elizabeth Gray, Accenture, USA * Ehud Gudes, Ben Gurion University of the Negev, Israel * Jochen Haller, SAP Research, Germany * Peter Herrmann, The Norwegian University of Science and Technology, Norway * Kevin Hoffman, Purdue University, USA * Steffen Huck, University College London, UK * Roslan Ismail, Universiti Tenaga Nasional (UNITEN), Malaysia * Valerie Issarny, INRIA, France * James Joshi, University of Pittsburgh, USA * Yuecel Karabulut, SAP Office of the CTO, USA * Gunter Karjoth, IBM, Switzerland * Reid Kerr, University of Waterloo, Canada * Claudia Keser, University of Goettingen, Germany * Hiroaki Kikuchi, Tokai University, Japan * Mark Kramer MITRE, USA * Adam J. Lee, University of Pittsburgh, USA * Ninghui Li, Purdue University, USA * Tie-Yan Liu, Microsoft Research, China * Stephane Lo Presti, Brunel University, UK * Emiliano Lorini, Institut de Recherche en Informatique de Toulouse (IRIT), France * Xixi Luo, Beihang University, China * Pratyusa Manadhata, Symantec Research, USA * Fabio Massacci, University of Trento, Italy * Kanta Matsuura, University of Tokyo, Japan * D. Harrison McKnight, Michigan State University, USA * Walter Quattrociocchi, ISTC-CNR, Italy * Mark Ryan, University of Birmingham, UK * Jordi Sabater-Mir, IIIA - CSIC, Spain * Kent Seamons, Brigham Young University, USA * Jean-Marc Seigneur, University of Geneva, Switzerland * Simon Shiu, HP Labs, UK * Joel Snyder, Opus One, USA * Jessica Staddon, PARC, USA * Ketil Stolen, SINTEF & University of Oslo, Norway * Vipin Swarup, MITRE, USA * Kenji Takahashi, NTT Corp., Japan * Sotirios Terzis, University of Strathclyde, UK * Mahesh Tripunitara, University of Waterloo, Canada * Tetsutaro Uehara, University of Kyoto, Japan * William H. Winsborough, University of Texas at San Antonio, USA * Marianne Winslett, University of Illinois at Urbana-Champaign, USA * Danfeng Yao, Rutgers University, New Brunswick, USA =============================================== |
|