posted by user: trust2012 || 10829 views || tracked by 20 users: [display]

TRUST 2012 : 5th International Conference on Trust and Trustworthy Computing


Conference Series : Trust and Trustworthy Computing
When Jun 13, 2012 - Jun 15, 2012
Where Vienna, Austria
Submission Deadline Feb 22, 2012
Notification Due Mar 25, 2012
Final Version Due Apr 9, 2012
Categories    trust   trustworthy   security   privacy

Call For Papers

TRUST 2012
5th International Conference on Trust and Trustworthy Computing
13-15 June 2012, Vienna, Austria

International Conference
TRUST 2012 is an international conference on the technical and socio-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.
The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts. Topics of interest include, but are not limited to:

Technical Strand:
* Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
* Trust, Security and Privacy in embedded systems
* Trust, Security and Privacy in social networks
* Trusted mobile platforms and mobile phone security
* Implementations of trusted computing (hardware and software)
* Applications of trusted computing
* Trustworthy infrastructures and resilient services for cloud computing
* Attestation and integrity verification
* Cryptographic aspects of trusted and trustworthy computing
* Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions
* Intrusion resilience in trusted computing
* Virtualization for trusted platforms
* Secure storage
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* Usability and end-user interactions with trusted platforms
* Limitations of trusted computing

Socio-economic Strand:
* Usability and user perceptions of trustworthy systems and risks
* Effects of trustworthy systems upon user/corporate/governmental behavior
* Economic drivers for trustworthy systems in corporate environment
* Impact of trustworthy systems in enhancing trust in cloud infrastructures
* The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
* The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
* Game theoretical approaches to modeling or designing trustworthy systems
* Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
* Experimental economics studies of trustworthiness
* Interplay between privacy (enhancing technologies), trustworthy systems
* Critiques of trustworthy systems

Submissions must be at most 18 pages in LNCS format (
No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.

All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed.
Authors of accepted papers must guarantee that their papers will be presented at the conference.

Important Dates
* Submission due: 22 February 2012, 23:59 UTC
* Notification: 25 March, 2012
* Camera ready: 9 April, 2012
* Conference: 13-15 June, 2012

General Chairs
*Edgar Weippl (Vienna University of Technology and SBA Research, Austria)
*Stefan Katzenbeisser (TU Darmstadt, Germany)

Program Chairs (Technical Strand)
*Mike Reiter (University of North Carolina, USA)
*Xinwen Zhang (Huwai, USA)

Program Committee (Technical Strand)
*Srdjan Capkun (ETHZ Zurich, Switzerland)
*Haibo Chen (Fudan University, China)
*Xuhua Ding (Singapore Management University, Singapore)
*Jan-Erik Ekberg (Nokia Research Center)
*Cedric Fournet (Microsoft Research, UK)
*Michael Franz (UC Irvine, US)
*Tal Garfinkel (VMware)
*Trent Jaeger (Penn State University, US)
*Xuxian Jiang (NCSU, US)
*Apu Kapadia (Indiana University, US)
*Jiangtao Li (Intel Labs)
*Peter Loscocco (NSA, US)
*Heiko Mantel (TU Darmstadt, Germany)
*Jonathan McCune (Carnegie Mellon University, US)
*Bryan Parno (Microsoft Research, UK)
*Reiner Sailer (IBM Research, US)
*Matthias Schunter (IBM Zurich, Switzerland)
*Jean-Pierre Seifert (DT-Lab, Germany)
*Elaine Shi (PARC, US)
*Sean Smith (Dartmouth College, US)
*Christian Stueble (Sirrix AG, Germany)
*Edward Suh (Cornell University, US)
*Neeraj Suri (TU Darmstadt, Germany)
*Jesse Walker (Intel Labs)
*Andrew Warfield (University of British Columbia, Canada)

Program Chairs (Socio-economic Strand)
*L. Jean Camp (Indiana University, USA)
*Melanie Volkamer (TU Darmstadt and CASED, Germany)

Program Committee (Socio-economic Strand)
*Alexander De Luca (Ludwig Maximilian University, Germany)
*Angela Sasse (University College London, UK)
*Artemios G. Voyiatzis (Industrial Systems Institute/ATHENA R.C, Greece)
*Eleni Kosta (Katholieke Universiteit Leuven, Belgium)
*Gabriele Lenzini (University of Luxembourg, Luxembourg)
*Guenther Pernul (Regensburg University, Germany)
*Heather Lipford (University of North Carolina at Charlotte, US)
*Ian Brown (University of Oxford, UK)
*Jeff Yan (Newcastle University, UK)
*Kristiina Karvonen (Helsinki Institute for Information Technology, Finland)
*Mario Cagalj (University of Split, Croatia)
*Mikko Siponen (University of OULU, Finland)
*Pam Briggs (Northumbria University, UK)
*Peter Buxmann (TU Darmstadt, Germany)
*Peter Ryan (University of Luxembourg, Luxembourg)
*Randi Markussen (University of Copenhagen, Denmark)
*Simone Fischer-Huebner (Karlstad University, Sweden)
*Sonia Chiasson (Carleton University, Canada)
*Stefano Zanero (Politecnico di Milano, Italy)
*Sven Dietrich (Stevens Institute of Technology, US)
*Tara Whalen (Carleton University, Canada)
*Yolanta Beres (HP Labs, US)

Publicity Chair:
*Marcel Winandy (Ruhr-University Bochum, Germany)

Related Resources

IEEE INFOCOM'23 AidTSP 2023   IEEE INFOCOM'23 AidTSP 2023 workshop - The 2023 International Workshop on AI-Driven Trustworthy, Secure, and Privacy-Preserving Computing (AidTSP 2023), May 20, 2023, NY, USA
IEEE COINS 2023   IEEE COINS 2023 - Berlin, Germany - July 23-25 - Hybrid (In-Person & Virtual)
FLAIRS-36 ST XAI, Bias, and Trust 2023   FLAIRS Special Track on Explainability, Bias, and Trust in Artificial Intelligence
CEVVE 2023   2023 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2023)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
CSW 2023   2023 International Workshop on Cyber Security (CSW 2023)
ICISSP 2023   9th International Conference on Information Systems Security and Privacy
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
ICHST 2023   2023 5th International Conference on Hardware Security and Trust (ICHST 2023)
SIPP 2023   11th International Conference on Signal, Image Processing and Pattern Recognition