posted by user: mpirker || 7342 views || tracked by 11 users: [display]

InTrust 2013 : 5th International Conference on Trusted Systems

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Trusted Systems
 
Link: http://intrust13.iaik.tugraz.at/
 
When Dec 5, 2013 - Dec 6, 2013
Where Graz, Austria
Submission Deadline Jul 29, 2013
Notification Due Aug 26, 2013
Final Version Due Sep 16, 2013
Categories    trust   security   mobile
 

Call For Papers

Call for Papers

InTrust 2013: 5th International Conference on Trusted Systems
5-6th December 2013, Graz, Austria
http://intrust13.iaik.tugraz.at/

The InTrust conference focuses on the theory, technologies and
applications of trusted systems. It is devoted to all aspects of
trusted computing systems, including trusted modules, platforms,
networks, services and applications, from their fundamental features
and functionalities to design principles, architecture and
implementation technologies. The goal of the conference is to bring
academic and industrial researchers, designers, and implementers
together with end-users of trusted systems, in order to foster the
exchange of ideas in this challenging and fruitful area.

InTrust 2013 will take place on 5th and 6th December 2013. The
conference will be hosted by the Institute for Applied Information
Processing and Communications (IAIK) of Graz University of
Technology (TUG). InTrust 2013 solicits original papers on any
aspect of the theory, advanced development and applications of
trusted computing, trustworthy systems and general trust issues in
modern computing systems.

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or have submitted in parallel to
any journal or other conference or workshop that has proceedings.
All submissions will be blind-reviewed. Papers must be anonymous,
with no author names, affiliations, acknowledgements, or obvious
references. A submitted paper should begin with a title, a short
abstract, and a list of keywords.

The proceedings of InTrust 2013 will be published in the Springer-
Verlag Lecture Notes in Computer Science series. Papers published in
the LNCS series are indexed by both EI and ISTP. Clear instructions
for the preparation of a final proceedings version will be sent to
the authors of accepted papers. Papers should be submitted in
standard LNCS format, with length at most 15 pages (excluding
bibliography and appendices). Committee members are not required to
review more pages than this, so papers should be intelligible within
this length. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Authors of accepted papers
must guarantee that their paper will be presented at the conference.
Papers must be submitted in PDF format using the EasyChair
conference management system at
https://www.easychair.org/account/signin.cgi?conf=intrust13

Please send any enquiries to: intrust13@iaik.tugraz.at

The conference has a best paper award to the value of US$1,000,
sponsored by Beijing Institute of Technology; all papers are
eligible for this award.

Topics of relevance include but are not limited to:
* Fundamental features and functionalities of trusted systems
* Primitives and mechanisms for building a chain of trust
* Design principles and architectures for trusted modules and
platforms
* Trustworthy infrastructures and cloud computing services
* Implementation technologies for trusted modules and platforms
* Cryptographic aspects of trusted systems, including cryptographic
algorithms and protocols, and their implementation and application
in trusted systems
* Secure network operation
* Mobile trusted systems
* Applications of trusted systems
* Trusted intellectual property protection: metering, watermarking,
digital rights management and enterprise rights management
* Software & hardware protection for trusted systems
* Authentication and access control for trusted systems
* Identity & privacy aspects of trusted systems
* Attestation for trusted systems, including measurement and
verification of the behavior of trusted systems
* Emerging technologies and standards for trusted systems
* Trust metrics and robust trust inference in distributed systems
* Usability and reliability aspects of trusted systems
* Trust modeling, economic analysis and protocol design for rational
and malicious adversaries
* Virtualization for trusted systems
* Limitations of trusted systems
* Security analysis of trusted systems, including formal methods
proofs, provable security and automated analysis
* Security policies for, and management of, trusted systems
* Intrusion resilience and revocation aspects of trusted systems
* Scalability aspects of trusted systems
* Compatibility aspects of trusted systems
* Experiences in building real-world trusted systems
* Socio-economic aspects of trusted systems

Key dates
EXTENDED Deadline for submissions: Monday, 29 July 2013(!)
Notifications to authors: Monday, 26 August 2013
Camera ready due: Monday, 16 September 2013
Opening of conference: Thursday, 5 December 2013

Program Committee Chairs
Roderick Bloem, Graz University of Technology, Austria
Peter Lipp, Graz University of Technology, Austria

Program Committee
Liqun Chen, HP Laboratories, UK
Zhong Chen, Peking University, China
Xuhua Ding, SMU, Singapore
Loic Duflot, SGDN, France
Dieter Gollmann, TU Hamburg-Harburg, Germany
Sigrid Guergens, Fraunhofer SIT, Germany
Stefan Katzenbeisser, TU Darmstadt, Germany
Dirk Kuhlmann, HP Laboratories, UK
Xuejia Lai, Shanghai Jiao Tong University, China
Mario Lamberger, NXP, Austria
Jiangtao Li, Intel, USA
Javier Lopez, University of Malaga, Spain
Stefan Mangard, Infineon, Germany
Andrew Martin, University of Oxford, UK
Shin'Ichiro Matsuo, NICT, Japan
Chris Mitchell, RHUL, UK
Yi Mu, University of Wollongong, Australia
Martin Pirker, Graz University of Technology, Austria
Graeme Proudler, HP Laboratories, UK
Scott Rotondo, Oracle, USA
Mark Ryan, University of Birmingham, UK
Willy Susilo, University of Wollongong, Australia
Ronald Toegl, Graz University of Technology, Austria
Claire Vishik, Intel, UK
Jian Weng, Jinan University, China
Marcel Winandy, Ruhr-University Bochum, Germany
Xinwen Zhang, Huawei Research Center, USA
Yongbin Zhou, Chinese Academy of Sciences, China
Liehuang Zhu, Beijing Institute of Technology, China
Yan Zhu, Peking University, China

Steering Committee
Yongfei Han, BJUT & ONETS, China
Moti Yung, Google & Columbia University, USA
Liqun Chen, HP Laboratories, UK
Robert Deng, SMU, Singapore
Chris Mitchell, RHUL, UK

Local Organizers
Martina Piewald
Martin Pirker
Ronald Toegl

Sponsors
Beijing Institute of Technology

Related Resources

PCDS 2024   The 1st International Symposium on Parallel Computing and Distributed Systems
CSW 2024   2024 3rd International Conference on Cyber Security
ASPLOS 2025   The ACM International Conference on Architectural Support for Programming Languages and Operating Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DDECS 2024   27th International Symposium on Design and Diagnostics of Electronic Circuits and Systems
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
NC2EAIS 2024   NATIONAL CONFERENCE ON COMPUTATIONAL ENGINEERING, ARTIFICIAL INTELLIGENCE AND SMART SYSTEMS
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
Sensors journal 2024   Special Issue on Energy-Efficient Communication Networks and Systems: 2nd Eition
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology