posted by user: marwinK || 10146 views || tracked by 18 users: [display]

STC 2011 : The 6th ACM Workshop on Scalable Trusted Computing

FacebookTwitterLinkedInGoogle


Conference Series : Scalable Trusted Computing
 
Link: http://www.cs.utsa.edu/~acmstc/stc2011/
 
When Oct 17, 2011 - Oct 17, 2011
Where Chicago, IL, USA
Submission Deadline Jul 18, 2011
Notification Due Aug 7, 2011
Final Version Due Aug 25, 2011
Categories    trusted computing   security   scalability   trust
 

Call For Papers

Built on the continuous success of ACM STC 2006-2010, this workshop focuses on fundamental technologies of trusted and high assurance computing and its applications in large-scale systems with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues.

The workshop is co-located with ACM CCS and solicits two types of original papers that are single-column using at least 11pt fonts. The length of the full-paper submissions is at most 15 pages excluding bibliography, appendix etc. The total number of pages should not be more than 20, whereas the reviewers are not required to read the appendix. The length of short/work-in-progress/position-paper submissions is at most 8 pages excluding bibliography. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to:

* security policies and models of trusted computing
* architecture and implementation technologies for trusted platform
* limitations, alternatives and tradeoffs regarding trusted computing
* trusted computing in cloud and data center
* cloud-based attestation services
* trusted smartphone devices and systems
* trust in smart grid, energy, and Internet of Things
* trusted emerging and future Internet infrastructure
* trusted online social network
* trust in authentications, users and computing services
* hardware based trusted computing
* software based trusted computing
* pros and cons of hardware based approach
* remote attestation of trusted devices
* censorship-freeness in trusted computing
* cryptographic support in trusted computing
* case study in trusted computing
* principles for handling scales
* scalable trust supports and services in cloud
* trusted embedded computing and systems
* virtualization and trusted computing



General Chair:
Yan Chen, Northwestern University, USA

Workshop Organizational Chair:
Shouhuai Xu, University of Texas, San Antonio, USA

PC Co-chairs:
Ahmad-Reza Sadeghi, TU-Darmstadt, Germany
Xinwen Zhang, Huawei Research Center, USA

Publicity and Web Chair:
Marcel Winandy, Ruhr-University Bochum, Germany

Paper Submission:
https://www.easychair.org/conferences/?conf=stc2011

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2