| |||||||||||||||
TRUST 2014 : 7th International Conference on Trust & Trustworthy ComputingConference Series : Trust and Trustworthy Computing | |||||||||||||||
Link: http://www.ics.forth.gr/trust2014/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
======================================================================
Call for Papers: TRUST 2014 7th International Conference on Trust & Trustworthy Computing June 30 - July 2, 2014 - Hersonissos, Crete, Greece ====================================================================== http://www.ics.forth.gr/trust2014/ / http://bit.ly/trust2014 About TRUST ---------------------------------------- TRUST 2014 is an international conference on the technical and socio-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems. TRUST 2014 will be held from June 30 to July 2 2014 in Hersonissos, Crete, Greece. Hersonissos is a popular holiday resort located 30km from Heraklion, the island's largest city. Important Dates ---------------------------------------- * Paper submission (extended): March 14, 2014 * Acceptance notification (extended): April 14, 2014 * Final paper due: April 21, 2014 * Conference: June 30 - July 2, 2014 Topics of Interest ---------------------------------------- TRUST 2014 solicits original contributions on any aspect of the design, application and usage of trusted and trustworthy computing. Topics of interest include (but are not limited to): * Architecture and implementation technologies for trusted platforms and trustworthy infrastructures * Trust, Security and Privacy in embedded systems * Trust, Security and Privacy in social networks * Trusted mobile platforms and mobile phone security * Implementations of trusted computing (hardware and software) * Applications of trusted computing * Trustworthy infrastructures and services for cloud computing (including resilience) * Attestation and integrity verification * Cryptographic aspects of trusted and trustworthy computing * Design, implementation and analysis of security hardware * Security hardware with cryptographic and security functions, physically unclonable functions (PUFs) * Intrusion resilience in trusted computing * Virtualization for trusted platforms * Secure storage * Security policy and management of trusted computing * Access control for trusted platforms * Privacy aspects of trusted computing * Verification of trusted computing architectures * Usability and end-user interactions with trusted platforms * Limitations of trusted computing * Role of trust in human-computer interactions * Usability and user perceptions of trustworthy systems and risks * Patterns of trust practices in human-computer interactions * Effects of trustworthy systems upon user, corporate, and governmental behavior * Impact of trustworthy systems in enhancing trust in cloud-like infrastructures * Adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight * Impact of trustworthy systems upon digital forensics, police investigations and court proceedings * Game theoretical approaches to modelling or designing trustworthy systems * Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space * Economic drivers for trustworthy systems in corporate environment * Experimental economics studies of trustworthiness * Interplay between privacy, privacy enhancing technologies and trustworthy systems * Evaluation of research methods used in the research of trustworthy and trusted computing * Critiques of trustworthy systems * Metrics of trust * Privacy Aspects of Trust Computing * Engineering Processes for Trustworthy Computing Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference. Format of paper submissions ---------------------------------------- Two formats of submissions are solicited: * Full papers (up to 18 pages) that report on in-depth, mature research results. * Short papers (up to 9 pages) that describe brief results or exciting work-in-progress. To submit your work, visit: https://www.easychair.org/conferences/?conf=trust-2014 All paper submissions to TRUST 2014 must be in LNCS format and written in English. The templates for LNCS format can be downloaded from: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0 All submissions must be within the page limits mentioned above. No changes to margins, spacing, or font sizes (or anything else) are allowed. The program committee reserves the right to request the source files for a submission to verify compliance with this requirement. Moreover, all submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not be overtly distinguishable from the referenced work of others. Only PDF files will be accepted. Poster submissions ---------------------------------------- TRUST 2014 encourages the presentation of posters that aim at the rapid dissemination of new ideas, work in progress or preliminary results. We particularly encourage PhD students to present their ongoing work. For details on poster submissions check our website: http://bit.ly/trust2014poster Organisation Committee ---------------------------------------- * General Chair: Ioannis Askoxylakis, FORTH, GR * Program Chairs: - Sotiris Ioannidis, FORTH, GR - Thorsten Holz, Ruhr University Bochum, DE For the full Program Committee see: http://bit.ly/trust2014pc TRUST 2014 Twitter Updates ---------------------------------------- Announcements regarding TRUST 2014 will be sent through @syssecproject on Twitter: https://twitter.com/syssecproject |
|