posted by user: mpirker || 7675 views || tracked by 11 users: [display]

InTrust 2013 : 5th International Conference on Trusted Systems

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Trusted Systems
 
Link: http://intrust13.iaik.tugraz.at/
 
When Dec 5, 2013 - Dec 6, 2013
Where Graz, Austria
Submission Deadline Jul 29, 2013
Notification Due Aug 26, 2013
Final Version Due Sep 16, 2013
Categories    trust   security   mobile
 

Call For Papers

Call for Papers

InTrust 2013: 5th International Conference on Trusted Systems
5-6th December 2013, Graz, Austria
http://intrust13.iaik.tugraz.at/

The InTrust conference focuses on the theory, technologies and
applications of trusted systems. It is devoted to all aspects of
trusted computing systems, including trusted modules, platforms,
networks, services and applications, from their fundamental features
and functionalities to design principles, architecture and
implementation technologies. The goal of the conference is to bring
academic and industrial researchers, designers, and implementers
together with end-users of trusted systems, in order to foster the
exchange of ideas in this challenging and fruitful area.

InTrust 2013 will take place on 5th and 6th December 2013. The
conference will be hosted by the Institute for Applied Information
Processing and Communications (IAIK) of Graz University of
Technology (TUG). InTrust 2013 solicits original papers on any
aspect of the theory, advanced development and applications of
trusted computing, trustworthy systems and general trust issues in
modern computing systems.

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or have submitted in parallel to
any journal or other conference or workshop that has proceedings.
All submissions will be blind-reviewed. Papers must be anonymous,
with no author names, affiliations, acknowledgements, or obvious
references. A submitted paper should begin with a title, a short
abstract, and a list of keywords.

The proceedings of InTrust 2013 will be published in the Springer-
Verlag Lecture Notes in Computer Science series. Papers published in
the LNCS series are indexed by both EI and ISTP. Clear instructions
for the preparation of a final proceedings version will be sent to
the authors of accepted papers. Papers should be submitted in
standard LNCS format, with length at most 15 pages (excluding
bibliography and appendices). Committee members are not required to
review more pages than this, so papers should be intelligible within
this length. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Authors of accepted papers
must guarantee that their paper will be presented at the conference.
Papers must be submitted in PDF format using the EasyChair
conference management system at
https://www.easychair.org/account/signin.cgi?conf=intrust13

Please send any enquiries to: intrust13@iaik.tugraz.at

The conference has a best paper award to the value of US$1,000,
sponsored by Beijing Institute of Technology; all papers are
eligible for this award.

Topics of relevance include but are not limited to:
* Fundamental features and functionalities of trusted systems
* Primitives and mechanisms for building a chain of trust
* Design principles and architectures for trusted modules and
platforms
* Trustworthy infrastructures and cloud computing services
* Implementation technologies for trusted modules and platforms
* Cryptographic aspects of trusted systems, including cryptographic
algorithms and protocols, and their implementation and application
in trusted systems
* Secure network operation
* Mobile trusted systems
* Applications of trusted systems
* Trusted intellectual property protection: metering, watermarking,
digital rights management and enterprise rights management
* Software & hardware protection for trusted systems
* Authentication and access control for trusted systems
* Identity & privacy aspects of trusted systems
* Attestation for trusted systems, including measurement and
verification of the behavior of trusted systems
* Emerging technologies and standards for trusted systems
* Trust metrics and robust trust inference in distributed systems
* Usability and reliability aspects of trusted systems
* Trust modeling, economic analysis and protocol design for rational
and malicious adversaries
* Virtualization for trusted systems
* Limitations of trusted systems
* Security analysis of trusted systems, including formal methods
proofs, provable security and automated analysis
* Security policies for, and management of, trusted systems
* Intrusion resilience and revocation aspects of trusted systems
* Scalability aspects of trusted systems
* Compatibility aspects of trusted systems
* Experiences in building real-world trusted systems
* Socio-economic aspects of trusted systems

Key dates
EXTENDED Deadline for submissions: Monday, 29 July 2013(!)
Notifications to authors: Monday, 26 August 2013
Camera ready due: Monday, 16 September 2013
Opening of conference: Thursday, 5 December 2013

Program Committee Chairs
Roderick Bloem, Graz University of Technology, Austria
Peter Lipp, Graz University of Technology, Austria

Program Committee
Liqun Chen, HP Laboratories, UK
Zhong Chen, Peking University, China
Xuhua Ding, SMU, Singapore
Loic Duflot, SGDN, France
Dieter Gollmann, TU Hamburg-Harburg, Germany
Sigrid Guergens, Fraunhofer SIT, Germany
Stefan Katzenbeisser, TU Darmstadt, Germany
Dirk Kuhlmann, HP Laboratories, UK
Xuejia Lai, Shanghai Jiao Tong University, China
Mario Lamberger, NXP, Austria
Jiangtao Li, Intel, USA
Javier Lopez, University of Malaga, Spain
Stefan Mangard, Infineon, Germany
Andrew Martin, University of Oxford, UK
Shin'Ichiro Matsuo, NICT, Japan
Chris Mitchell, RHUL, UK
Yi Mu, University of Wollongong, Australia
Martin Pirker, Graz University of Technology, Austria
Graeme Proudler, HP Laboratories, UK
Scott Rotondo, Oracle, USA
Mark Ryan, University of Birmingham, UK
Willy Susilo, University of Wollongong, Australia
Ronald Toegl, Graz University of Technology, Austria
Claire Vishik, Intel, UK
Jian Weng, Jinan University, China
Marcel Winandy, Ruhr-University Bochum, Germany
Xinwen Zhang, Huawei Research Center, USA
Yongbin Zhou, Chinese Academy of Sciences, China
Liehuang Zhu, Beijing Institute of Technology, China
Yan Zhu, Peking University, China

Steering Committee
Yongfei Han, BJUT & ONETS, China
Moti Yung, Google & Columbia University, USA
Liqun Chen, HP Laboratories, UK
Robert Deng, SMU, Singapore
Chris Mitchell, RHUL, UK

Local Organizers
Martina Piewald
Martin Pirker
Ronald Toegl

Sponsors
Beijing Institute of Technology

Related Resources

ICAUAS 2025   2025 International Conference on Advanced Unmanned Aerial Systems (ICAUAS 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ISCSIC 2025   2025 9th International Symposium on Computer Science and Intelligent Control(ISCSIC 2025)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
MODERN SYSTEMS 2025   International Conference of Modern Systems Engineering Solutions
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
BS LAB 2025   9th Business Systems Laboratory International Symposium TECHNOLOGY AND SOCIETY: Boon or Bane?