| |||||||||||||||
InTrust 2013 : 5th International Conference on Trusted SystemsConference Series : International Conference on Trusted Systems | |||||||||||||||
Link: http://intrust13.iaik.tugraz.at/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
InTrust 2013: 5th International Conference on Trusted Systems 5-6th December 2013, Graz, Austria http://intrust13.iaik.tugraz.at/ The InTrust conference focuses on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. InTrust 2013 will take place on 5th and 6th December 2013. The conference will be hosted by the Institute for Applied Information Processing and Communications (IAIK) of Graz University of Technology (TUG). InTrust 2013 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems. Submissions must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any journal or other conference or workshop that has proceedings. All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords. The proceedings of InTrust 2013 will be published in the Springer- Verlag Lecture Notes in Computer Science series. Papers published in the LNCS series are indexed by both EI and ISTP. Clear instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers. Papers should be submitted in standard LNCS format, with length at most 15 pages (excluding bibliography and appendices). Committee members are not required to review more pages than this, so papers should be intelligible within this length. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that their paper will be presented at the conference. Papers must be submitted in PDF format using the EasyChair conference management system at https://www.easychair.org/account/signin.cgi?conf=intrust13 Please send any enquiries to: intrust13@iaik.tugraz.at The conference has a best paper award to the value of US$1,000, sponsored by Beijing Institute of Technology; all papers are eligible for this award. Topics of relevance include but are not limited to: * Fundamental features and functionalities of trusted systems * Primitives and mechanisms for building a chain of trust * Design principles and architectures for trusted modules and platforms * Trustworthy infrastructures and cloud computing services * Implementation technologies for trusted modules and platforms * Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems * Secure network operation * Mobile trusted systems * Applications of trusted systems * Trusted intellectual property protection: metering, watermarking, digital rights management and enterprise rights management * Software & hardware protection for trusted systems * Authentication and access control for trusted systems * Identity & privacy aspects of trusted systems * Attestation for trusted systems, including measurement and verification of the behavior of trusted systems * Emerging technologies and standards for trusted systems * Trust metrics and robust trust inference in distributed systems * Usability and reliability aspects of trusted systems * Trust modeling, economic analysis and protocol design for rational and malicious adversaries * Virtualization for trusted systems * Limitations of trusted systems * Security analysis of trusted systems, including formal methods proofs, provable security and automated analysis * Security policies for, and management of, trusted systems * Intrusion resilience and revocation aspects of trusted systems * Scalability aspects of trusted systems * Compatibility aspects of trusted systems * Experiences in building real-world trusted systems * Socio-economic aspects of trusted systems Key dates EXTENDED Deadline for submissions: Monday, 29 July 2013(!) Notifications to authors: Monday, 26 August 2013 Camera ready due: Monday, 16 September 2013 Opening of conference: Thursday, 5 December 2013 Program Committee Chairs Roderick Bloem, Graz University of Technology, Austria Peter Lipp, Graz University of Technology, Austria Program Committee Liqun Chen, HP Laboratories, UK Zhong Chen, Peking University, China Xuhua Ding, SMU, Singapore Loic Duflot, SGDN, France Dieter Gollmann, TU Hamburg-Harburg, Germany Sigrid Guergens, Fraunhofer SIT, Germany Stefan Katzenbeisser, TU Darmstadt, Germany Dirk Kuhlmann, HP Laboratories, UK Xuejia Lai, Shanghai Jiao Tong University, China Mario Lamberger, NXP, Austria Jiangtao Li, Intel, USA Javier Lopez, University of Malaga, Spain Stefan Mangard, Infineon, Germany Andrew Martin, University of Oxford, UK Shin'Ichiro Matsuo, NICT, Japan Chris Mitchell, RHUL, UK Yi Mu, University of Wollongong, Australia Martin Pirker, Graz University of Technology, Austria Graeme Proudler, HP Laboratories, UK Scott Rotondo, Oracle, USA Mark Ryan, University of Birmingham, UK Willy Susilo, University of Wollongong, Australia Ronald Toegl, Graz University of Technology, Austria Claire Vishik, Intel, UK Jian Weng, Jinan University, China Marcel Winandy, Ruhr-University Bochum, Germany Xinwen Zhang, Huawei Research Center, USA Yongbin Zhou, Chinese Academy of Sciences, China Liehuang Zhu, Beijing Institute of Technology, China Yan Zhu, Peking University, China Steering Committee Yongfei Han, BJUT & ONETS, China Moti Yung, Google & Columbia University, USA Liqun Chen, HP Laboratories, UK Robert Deng, SMU, Singapore Chris Mitchell, RHUL, UK Local Organizers Martina Piewald Martin Pirker Ronald Toegl Sponsors Beijing Institute of Technology |
|