posted by organizer: mstamat || 8609 views || tracked by 19 users: [display]

TRUST 2014 : 7th International Conference on Trust & Trustworthy Computing


Conference Series : Trust and Trustworthy Computing
When Jun 30, 2014 - Jul 2, 2014
Where Hersonissos, Crete, Greece
Submission Deadline Mar 14, 2014
Notification Due Apr 14, 2014
Final Version Due Apr 21, 2014
Categories    trusted computing   trust   security   privacy

Call For Papers

Call for Papers: TRUST 2014
7th International Conference on Trust & Trustworthy Computing
June 30 - July 2, 2014 - Hersonissos, Crete, Greece
====================================================================== /

TRUST 2014 is an international conference on the technical and
socio-economic aspects of trustworthy infrastructures. It provides
an excellent interdisciplinary forum for researchers, practitioners,
and decision makers to explore new ideas and discuss experiences in
building, designing, using and understanding trustworthy computing

TRUST 2014 will be held from June 30 to July 2 2014 in Hersonissos,
Crete, Greece. Hersonissos is a popular holiday resort located 30km
from Heraklion, the island's largest city.

Important Dates
* Paper submission (extended): March 14, 2014
* Acceptance notification (extended): April 14, 2014
* Final paper due: April 21, 2014
* Conference: June 30 - July 2, 2014

Topics of Interest
TRUST 2014 solicits original contributions on any aspect of the
design, application and usage of trusted and trustworthy computing.
Topics of interest include (but are not limited to):

* Architecture and implementation technologies for trusted
platforms and trustworthy infrastructures
* Trust, Security and Privacy in embedded systems
* Trust, Security and Privacy in social networks
* Trusted mobile platforms and mobile phone security
* Implementations of trusted computing (hardware and software)
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
(including resilience)
* Attestation and integrity verification
* Cryptographic aspects of trusted and trustworthy computing
* Design, implementation and analysis of security hardware
* Security hardware with cryptographic and security functions,
physically unclonable functions (PUFs)
* Intrusion resilience in trusted computing
* Virtualization for trusted platforms
* Secure storage
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* Usability and end-user interactions with trusted platforms
* Limitations of trusted computing
* Role of trust in human-computer interactions
* Usability and user perceptions of trustworthy systems and risks
* Patterns of trust practices in human-computer interactions
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* Impact of trustworthy systems in enhancing trust in cloud-like
* Adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* Impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Game theoretical approaches to modelling or designing trustworthy
* Approaches to model and simulate scenarios of how trustworthy
systems would be used in corporate environments and in personal
* Economic drivers for trustworthy systems in corporate
* Experimental economics studies of trustworthiness
* Interplay between privacy, privacy enhancing technologies and
trustworthy systems
* Evaluation of research methods used in the research of
trustworthy and trusted computing
* Critiques of trustworthy systems
* Metrics of trust
* Privacy Aspects of Trust Computing
* Engineering Processes for Trustworthy Computing

Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal,
conference or workshop. Simultaneous submission of the same work
is not allowed. Authors of accepted papers must guarantee that their
papers will be presented at the conference.

Format of paper submissions
Two formats of submissions are solicited:
* Full papers (up to 18 pages) that report on in-depth, mature
research results.
* Short papers (up to 9 pages) that describe brief results or
exciting work-in-progress.

To submit your work, visit:

All paper submissions to TRUST 2014 must be in LNCS format and written
in English. The templates for LNCS format can be downloaded from:

All submissions must be within the page limits mentioned above.
No changes to margins, spacing, or font sizes (or anything else)
are allowed. The program committee reserves the right to request
the source files for a submission to verify compliance with this

Moreover, all submissions must be anonymized. An author's name should
occur only in references to that author's related work, which should
be referenced in the third person and not be overtly distinguishable
from the referenced work of others.

Only PDF files will be accepted.

Poster submissions
TRUST 2014 encourages the presentation of posters that aim at the
rapid dissemination of new ideas, work in progress or preliminary
results. We particularly encourage PhD students to present their
ongoing work.

For details on poster submissions check our website:

Organisation Committee
* General Chair: Ioannis Askoxylakis, FORTH, GR
* Program Chairs:
- Sotiris Ioannidis, FORTH, GR
- Thorsten Holz, Ruhr University Bochum, DE

For the full Program Committee see:

TRUST 2014 Twitter Updates
Announcements regarding TRUST 2014 will be sent through @syssecproject
on Twitter:

Related Resources

PARMA-DITAM 2021   PARMA-DITAM: 12th Workshop on Parallel Programming and Run-Time Management Techniques for Many-core Architectures & 10th Workshop on Design Tools and Architectures for Multi-Core
BES 2021   5th International Conference on Biomedical Engineering and Science
SPT-IoT 2021   IEEE Percom Workshop on Security, Privacy, and Trust in the Internet of Things (SPT-IoT)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
HOST 2021   IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
IJAIT 2021   International Journal of Advanced Information Technology
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
BlockchainTrust 2021   Trust Models for Next-generation Blockchain Ecosystems
ICISSP 2021   7th International Conference on Information Systems Security and Privacy
IJCCSA 2021   International Journal on Cloud Computing: Services and Architecture