| |||||||||||||||
STC 2010 : 5th Annual Workshop on Scalable Trusted ComputingConference Series : Scalable Trusted Computing | |||||||||||||||
Link: http://stc2010.trust.rub.de/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
STC 2010: The Fifth Annual Workshop on Scalable Trusted Computing
A workshop held in conjunction with the 17th ACM Conference on Computer and Communications Security (ACM CCS'10) Monday Oct. 4, 2010, Hyatt Regency Chicago, Chicago, Illinois, USA Built on the continued success of previous STC workshops (starting from ACM STC'06) this workshop focuses on fundamental technologies of trusted computing (in a broad sense, with or without TPMs) and its applications in large-scale systems -- those involving large number of users and parties with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. The workshop solicits two types of original papers that are single-column using at least 11pt fonts. The length of the full-paper submissions is at most 15 pages excluding bibliography, appendix etc. The total number of pages should not be more than 20, whereas the reviewers are not required to read the appendix. The length of short/work-in-progress/position-paper submissions is at most 8 pages excluding bibliography. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to: * Enabling scalable trusted computing - better approaches to measurement management - better approaches to attestation - cryptographic support for trusted computing - architectural support for trusted computing - security policies and models of trusted computing - access control for trusted computing - architecture and implementation technologies for trusted platform - virtualization technology for trusted computing - establishing trust on software, users and services - intrusion tolerance/resilience in trusted computing - hardware-based approach to trusted computing - software-based approach to trusted computing - censorship-freeness in trusted computing - principles and technologies for handling scales - tackling complexity introduced by scalability * Applications of trusted computing - sustainable services based on trusted computing - trusted cloud computing - trusted embedded computing - killer applications of trusted computing - case study in trusted computing - scalable trust and services - large-scale trusted computing * Pushing the limits - limitations, alternatives and tradeoffs regarding trusted computing - realizing trustworthy computing via trusted computing - understanding expectedness of system properties - understanding system-level trust and trustworthiness - novel architectures for putting pieces together for STC Submission website http://stc2010.trust.rub.de/wsr/submit/ General Chair Shouhuai Xu, University of Texas, San Antonio Program Committee Co-chairs N. Asokan, Nokia Research Center Ahmad-Reza Sadeghi, Ruhr-University Bochum, Germany Web and Proceedings Chair Marcel Winandy, Ruhr-University Bochum, Germany Program Committee Frederik Armknecht, Universität Mannheim, Germany Bogdan Carbunar, Motorola Liqun Chen, HP Laboratories, UK Robert Deng, School of Information Systems SMU, Singapore Paul England, Microsoft Darko Kirovski, Microsoft Research Klaus Kursawe, Philips Research Jiangtao Li, Intel Peter Loscocco, NSA Jon McCune, Carnegie Mellon University, USA Chris Mitchell, Royal Holloway University, UK Ahmad-Reza Sadeghi, Ruhr-University Bochum, Germany Radu Sion, Stony Brook University, USA Sean Smith, Dartmouth College, USA Christian Stüble, Sirrix, Germany Marcel Winandy, Ruhr-University Bochum, Germany Xinwen Zhang, Samsung |
|