posted by organizer: mstamat || 11022 views || tracked by 19 users: [display]

TRUST 2014 : 7th International Conference on Trust & Trustworthy Computing

FacebookTwitterLinkedInGoogle


Conference Series : Trust and Trustworthy Computing
 
Link: http://www.ics.forth.gr/trust2014/
 
When Jun 30, 2014 - Jul 2, 2014
Where Hersonissos, Crete, Greece
Submission Deadline Mar 14, 2014
Notification Due Apr 14, 2014
Final Version Due Apr 21, 2014
Categories    trusted computing   trust   security   privacy
 

Call For Papers

======================================================================
Call for Papers: TRUST 2014
7th International Conference on Trust & Trustworthy Computing
June 30 - July 2, 2014 - Hersonissos, Crete, Greece
======================================================================

http://www.ics.forth.gr/trust2014/ / http://bit.ly/trust2014

About TRUST
----------------------------------------
TRUST 2014 is an international conference on the technical and
socio-economic aspects of trustworthy infrastructures. It provides
an excellent interdisciplinary forum for researchers, practitioners,
and decision makers to explore new ideas and discuss experiences in
building, designing, using and understanding trustworthy computing
systems.

TRUST 2014 will be held from June 30 to July 2 2014 in Hersonissos,
Crete, Greece. Hersonissos is a popular holiday resort located 30km
from Heraklion, the island's largest city.

Important Dates
----------------------------------------
* Paper submission (extended): March 14, 2014
* Acceptance notification (extended): April 14, 2014
* Final paper due: April 21, 2014
* Conference: June 30 - July 2, 2014

Topics of Interest
----------------------------------------
TRUST 2014 solicits original contributions on any aspect of the
design, application and usage of trusted and trustworthy computing.
Topics of interest include (but are not limited to):

* Architecture and implementation technologies for trusted
platforms and trustworthy infrastructures
* Trust, Security and Privacy in embedded systems
* Trust, Security and Privacy in social networks
* Trusted mobile platforms and mobile phone security
* Implementations of trusted computing (hardware and software)
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
(including resilience)
* Attestation and integrity verification
* Cryptographic aspects of trusted and trustworthy computing
* Design, implementation and analysis of security hardware
* Security hardware with cryptographic and security functions,
physically unclonable functions (PUFs)
* Intrusion resilience in trusted computing
* Virtualization for trusted platforms
* Secure storage
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* Usability and end-user interactions with trusted platforms
* Limitations of trusted computing
* Role of trust in human-computer interactions
* Usability and user perceptions of trustworthy systems and risks
* Patterns of trust practices in human-computer interactions
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* Impact of trustworthy systems in enhancing trust in cloud-like
infrastructures
* Adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* Impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Game theoretical approaches to modelling or designing trustworthy
systems
* Approaches to model and simulate scenarios of how trustworthy
systems would be used in corporate environments and in personal
space
* Economic drivers for trustworthy systems in corporate
environment
* Experimental economics studies of trustworthiness
* Interplay between privacy, privacy enhancing technologies and
trustworthy systems
* Evaluation of research methods used in the research of
trustworthy and trusted computing
* Critiques of trustworthy systems
* Metrics of trust
* Privacy Aspects of Trust Computing
* Engineering Processes for Trustworthy Computing

Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal,
conference or workshop. Simultaneous submission of the same work
is not allowed. Authors of accepted papers must guarantee that their
papers will be presented at the conference.

Format of paper submissions
----------------------------------------
Two formats of submissions are solicited:
* Full papers (up to 18 pages) that report on in-depth, mature
research results.
* Short papers (up to 9 pages) that describe brief results or
exciting work-in-progress.

To submit your work, visit: https://www.easychair.org/conferences/?conf=trust-2014

All paper submissions to TRUST 2014 must be in LNCS format and written
in English. The templates for LNCS format can be downloaded from:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0

All submissions must be within the page limits mentioned above.
No changes to margins, spacing, or font sizes (or anything else)
are allowed. The program committee reserves the right to request
the source files for a submission to verify compliance with this
requirement.

Moreover, all submissions must be anonymized. An author's name should
occur only in references to that author's related work, which should
be referenced in the third person and not be overtly distinguishable
from the referenced work of others.

Only PDF files will be accepted.

Poster submissions
----------------------------------------
TRUST 2014 encourages the presentation of posters that aim at the
rapid dissemination of new ideas, work in progress or preliminary
results. We particularly encourage PhD students to present their
ongoing work.

For details on poster submissions check our website:
http://bit.ly/trust2014poster

Organisation Committee
----------------------------------------
* General Chair: Ioannis Askoxylakis, FORTH, GR
* Program Chairs:
- Sotiris Ioannidis, FORTH, GR
- Thorsten Holz, Ruhr University Bochum, DE

For the full Program Committee see: http://bit.ly/trust2014pc

TRUST 2014 Twitter Updates
----------------------------------------
Announcements regarding TRUST 2014 will be sent through @syssecproject
on Twitter: https://twitter.com/syssecproject

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
FLAIRS-ST XAI, Fairness, and Trust 2025   FLAIRS-38 Special Track on Explainable, Fair, and Trustworthy AI
TrustCom 2024   The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
AISyS 2025   The Second International Conference on AI-based Systems and Services
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus