posted by user: jonmccune || 15242 views || tracked by 38 users: [display]

TRUST 2011 : TRUST 2011: 4th International Conference on Trust and Trustworthy Computing


Conference Series : Trust and Trustworthy Computing
When Jun 22, 2011 - Jun 24, 2011
Where Pittsburgh, PA, USA
Submission Deadline Feb 15, 2011
Notification Due Mar 25, 2011
Final Version Due Apr 12, 2011
Categories    trust   security   privacy   socio-economic

Call For Papers

Call for Papers

Trust 2011
4th International Conference on Trust and Trustworthy Computing

June 22-24, 2011
CyLab/CMU, Pittsburgh, PA, USA

Submissions due: 15 February 2011 (11:59pm EST)

Building on the success of Trust 2010 (held in Berlin, Germany), Trust
2009 (Oxford, UK) and Trust 2008 (Villach, Austria), this conference
focuses on trusted and trustworthy computing, both from the technical
and social perspectives. The conference itself has two main strands,
one devoted to technical aspects and one devoted to socio-economic
aspects of trusted computing.

The conference solicits original papers on any aspect (technical or social
and economic) of the design, application and usage of trusted and
trustworthy computing, which concerns a broad range of concepts including
trustworthy infrastructures, cloud computing, services, hardware, software
and protocols. Topics of interest include, but are not limited to:

Technical Strand:
* Architecture and implementation technologies for trusted platforms
and trustworthy infrastructures
* Trust, Security and Privacy in embedded systems
* Trust, Security and Privacy in social networks
* Trusted mobile platforms and mobile phone security
* Implementations of trusted computing (hardware and software)
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
(including resilience)
* Attestation and integrity verification
* Cryptographic aspects of trusted and trustworthy computing
* Design, implementation and analysis of security hardware, i.e.,
hardware with cryptographic and security functions, physically
unclonable functions (PUFs)
* Intrusion resilience in trusted computing
* Virtualization for trusted platforms
* Secure storage
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* Usability and end-user interactions with trusted platforms
* Limitations of trusted computing

Socio-economic Strand:
* Usability and user perceptions of trustworthy systems and risks
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* Economic drivers for trustworthy systems in corporate environment
* The impact of trustworthy systems in enhancing trust in cloud-like
* The adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* The impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Game theoretical approaches to modeling or designing trustworthy
* Approaches to model and simulate scenarios of how trustworthy systems
would be used in corporate environments and in personal space
* Experimental economics studies of trustworthiness
* The interplay between privacy, privacy enhancing technologies and
trustworthy systems
* Critiques of trustworthy systems

General Chairs:
Jonathan McCune (Carnegie Mellon University, USA)
Boris Balacheff (HP Labs, UK)

Program Chairs (Technical Strand)
Adrian Perrig (Carnegie Mellon University, USA)
Ahmad-Reza Sadeghi (TU Darmstadt / Fraunhofer SIT, Germany)

Program Chairs (Socio-economic Strand)
Angela Sasse (UCL, UK)
Yolanta Beres (HP Labs, UK)

Program Committee (Technical Strand)
Frederik Armknecht (University of Mannheim, Germany)
Marina Blanton (University of Notre Dame, USA)
Sergey Bratus (Dartmouth College, USA)
Christian Cachin (IBM Research, Switzerland)
Liqun Chen (HP Laboratories, UK)
Xuhua Ding (Singapore Management University, Singapore)
Paul England (Microsoft, USA)
Michael Franz (University of California, Irvine, USA)
Christian Gehrmann (SICS, Sweden)
David Grawrock (Intel, USA)
Helena Handschuh (Intrinsic-ID, USA / KU Leuven, Belgium)
Gernot Heiser (NICTA, Australia)
Thorsten Holz (Ruhr-University Bochum, Germany)
Cynthia Irvine (Naval Postgraduate School, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Michael LeMay (University of Illinois Urbana-Champaign, USA)
David Lie (University of Toronto, Canada)
Peter Lipp (TU Graz, Austria)
Michael Locasto (University of Calgary, Canada)
Andrew Martin (University of Oxford, UK)
Jon Millen (The MITRE Corporation, USA)
Chris Mitchell (Royal Holloway University, UK)
David Naccache (ENS, France)
Bart Preneel (KU Leuven, Belgium)
Graeme Proudler (HP Laboratories, UK)
Anand Rajan (Intel Labs, USA)
Scott Rotondo (Oracle, USA)
Mark Ryan (University of Birmingham, UK)
Jean-Pierre Seifert (TU Berlin / T-Labs, Germany)
Reiner Sailer (IBM Research, USA)
Matthias Schunter (IBM Research, Switzerland)
Sean Smith (Dartmouth College, USA)
Christian Stueble (Sirrix, Germany)
G. Edward Suh (Cornell University, USA)
Berk Sunar (WPI, USA)
Leendert van Doorn (AMD, USA)
Claire Vishik (Intel, UK)
Michael Waidner (Fraunhofer SIT / TU Darmstadt, Germany)
Marcel Winandy (Ruhr-University Bochum, Germany)
Xinwen Zhang (Huawei America Research Center, USA)

Program Committee (Socio-economic Strand)
Alessandro Acquisti (Carnegie Mellon University, USA)
Andrew A. Adams (Meiji University, Japan)
Rainer Boehme (University of Muenster, Germany)
Ian Brown (University of Oxford, UK)
Johann Cas (Austrian Academy of Science)
Tamara Dinev (Florida Atlantic University, USA)
Jens Grossklags (Pennsylvania State University, USA)
Peter Gutmann (University of Auckland, New Zealand)
Tristan Henderson (University of St Andrews, UK)
Adam Joinson (Bath University, UK)
Eleni Kosta (Katholieke Universiteit Leuven, Belgium)
Meryem Marzouki (French National Scientific Research Center)
Tyler Moore (Harvard University, USA)
Andrew Patrick (Office of the Privacy Commissioner of Canada)
Jens Riegelsberger (Google Research, UK)

Important Dates:
Submission due: 15 February 2011 (11:59pm EST)
Notification: 25 March 2011
Camera ready: 12 April 2011
Conference: 22-24 June 2010

Paper Submission:

Related Resources

NordSec 2022   The 27th Nordic Conference on Secure IT Systems
IEEE BC4TAI 2022   Workshop on Blockchain Technologies for Trustworthy Decentralized AI Ecosystems
ACNS 2023   21st International Conference on Applied Cryptography and Network Security
TrustCom 2022   The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
C&ESAR 2022   Ensuring Trust in a Decentralized World
IEEE PriComp 2022   The 2022 IEEE International Conference on Privacy Computing
Sensors (MDPI) SI 2022   Ethics, Privacy and Trust in IoT-Based Smart Homes and Buildings
AICCSA 2022   19th ACS/IEEE International Conference on Computer Systems and Applications
NLMLT 2022   International Conference on NLP and Machine Learning Trends