posted by user: marwinK || 7591 views || tracked by 7 users: [display]

STC 2010 : 5th Annual Workshop on Scalable Trusted Computing

FacebookTwitterLinkedInGoogle


Conference Series : Scalable Trusted Computing
 
Link: http://stc2010.trust.rub.de/
 
When Oct 4, 2010 - Oct 4, 2010
Where Chicago, IL, USA
Submission Deadline Jun 14, 2010
Notification Due Jul 20, 2010
Final Version Due Aug 16, 2010
Categories    security   trusted computing   applications   scalability
 

Call For Papers

STC 2010: The Fifth Annual Workshop on Scalable Trusted Computing

A workshop held in conjunction with the 17th ACM Conference on
Computer and Communications Security (ACM CCS'10)
Monday Oct. 4, 2010, Hyatt Regency Chicago, Chicago, Illinois, USA

Built on the continued success of previous STC workshops (starting from
ACM STC'06) this workshop focuses on fundamental technologies of trusted
computing (in a broad sense, with or without TPMs) and its applications in
large-scale systems -- those involving large number of users and parties
with varying degrees of trust. The workshop is intended to serve as a
forum for researchers as well as practitioners to disseminate and discuss
recent advances and emerging issues.

The workshop solicits two types of original papers that are single-column
using at least 11pt fonts. The length of the full-paper submissions is at
most 15 pages excluding bibliography, appendix etc. The total number of
pages should not be more than 20, whereas the reviewers are not required
to read the appendix. The length of short/work-in-progress/position-paper
submissions is at most 8 pages excluding bibliography. A paper submitted
to this workshop must not be in parallel submission to any other journal,
magazine, conference or workshop with proceedings. It is up to the authors
to decide whether a submission should be anonymous.

Topics of interests include but not limited to:
* Enabling scalable trusted computing
- better approaches to measurement management
- better approaches to attestation
- cryptographic support for trusted computing
- architectural support for trusted computing
- security policies and models of trusted computing
- access control for trusted computing
- architecture and implementation technologies for trusted platform
- virtualization technology for trusted computing
- establishing trust on software, users and services
- intrusion tolerance/resilience in trusted computing
- hardware-based approach to trusted computing
- software-based approach to trusted computing
- censorship-freeness in trusted computing
- principles and technologies for handling scales
- tackling complexity introduced by scalability

* Applications of trusted computing
- sustainable services based on trusted computing
- trusted cloud computing
- trusted embedded computing
- killer applications of trusted computing
- case study in trusted computing
- scalable trust and services
- large-scale trusted computing

* Pushing the limits
- limitations, alternatives and tradeoffs regarding trusted computing
- realizing trustworthy computing via trusted computing
- understanding expectedness of system properties
- understanding system-level trust and trustworthiness
- novel architectures for putting pieces together for STC


Submission website
http://stc2010.trust.rub.de/wsr/submit/

General Chair
Shouhuai Xu, University of Texas, San Antonio

Program Committee Co-chairs
N. Asokan, Nokia Research Center
Ahmad-Reza Sadeghi, Ruhr-University Bochum, Germany

Web and Proceedings Chair
Marcel Winandy, Ruhr-University Bochum, Germany

Program Committee
Frederik Armknecht, Universität Mannheim, Germany
Bogdan Carbunar, Motorola
Liqun Chen, HP Laboratories, UK
Robert Deng, School of Information Systems SMU, Singapore
Paul England, Microsoft
Darko Kirovski, Microsoft Research
Klaus Kursawe, Philips Research
Jiangtao Li, Intel
Peter Loscocco, NSA
Jon McCune, Carnegie Mellon University, USA
Chris Mitchell, Royal Holloway University, UK
Ahmad-Reza Sadeghi, Ruhr-University Bochum, Germany
Radu Sion, Stony Brook University, USA
Sean Smith, Dartmouth College, USA
Christian Stüble, Sirrix, Germany
Marcel Winandy, Ruhr-University Bochum, Germany
Xinwen Zhang, Samsung

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ccpi 2025   16th International Workshop on Cloud-Edge Continuum Projects and Initiatives (CCPI)
3CVIP 2025   2025 4th Asia Conference on Cloud Computing, Computer Vision and Image Processing (3CVIP 2025)