posted by user: tnhh || 6614 views || tracked by 15 users: [display]

Trust 2010 : 3rd International Conference on Trust and Trustworthy Computing


Conference Series : Trust and Trustworthy Computing
When Jun 21, 2010 - Jun 23, 2010
Where Berlin, Germany
Submission Deadline Feb 24, 2010
Notification Due Mar 22, 2010
Final Version Due Apr 5, 2010
Categories    trust   trusted-computing   socio-economics   security

Call For Papers

Call for Papers

Trust 2010
3rd International Conference on Trust and Trustworthy Computing

June 21-23, 2010, Berlin, Germany


Building on the success of Trust 2009 (held at Oxford, UK) and Trust 2008
(Villach, Austria), this conference focuses on trusted and trustworthy
computing, both from the technical and social perspectives. The conference
itself will have two main strands, one devoted to technical aspects and
one devoted to the socio-economic aspects of trusted computing.

The conference solicits original papers on any aspect (technical or social
and economic) of the design, application and usage of trusted and
trustworthy computing, which concerns a broad range of concepts including
trustworthy infrastructures, services, hardware, software and protocols.
Topics of interest include, but are not limited to:

Technical Strand:
* Architecture and implementation technologies for trusted platforms
and trustworthy infrastructures
* Mobile trusted computing
* Implementations of trusted computing (covering both hardware and
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
* Attestation and possible variants (e.g., property-based
attestation, runtime attestation)
* Cryptographic aspects of trusted computing
* Security hardware, i.e., hardware with cryptographic and
security functions, physically unclonable functions (PUFs)
* Establishing trust in embedded systems (e.g., sensor networks)
* Hardware Trojans (detection, prevention)
* Intrusion resilience in trusted computing
* Virtualisation for trusted platforms
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* End-user interactions with trusted platforms
* Limitations of trusted computing

Socio-economic Strand:
* Usability and user perceptions of trustworthy systems and risks
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* The adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* The impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Economic drivers for trustworthy systems
* Group and organizational behavior within trustworthy systems
* The impact of trustworthy systems upon user autonomy, social
capital, and power relationships
* Cross-cultural definitions of trustworthiness
* Can systems be truly "trustworthy" without any capacity for moral
* Trustworthy systems and precursors of trust such as honesty,
benevolence, value similarity, or competence
* Trustworthiness, regret and forgiveness
* Trustworthy systems as enhancements or constraints on government
* The role of independence from vested interests as a driver of trust
* Game theoretical approaches to modeling or designing trustworthy
* Experimental economics studies of trustworthiness
* The interplay between privacy, privacy enhancing technologies and
* Regulatory vs peer-produced trustworthiness, including reputation
* Global governance initiatives to manage trust
* Critiques of trustworthy systems

General Chair:
Ahmad-Reza Sadeghi, University of Bochum, Germany

Program Chair (Technical Strand)
Sean Smith, Dartmouth College, USA

Program Chair (Socio-economic Strand)
Alessandro Acquisti, Carnegie Mellon University, USA

Program Committee (Technical Strand)
N. Asokan, Nokia Research Center, Finland
Sergey Bratus, Dartmouth College, USA
Liqun Chen, HP Laboratories, UK
David Grawrock, Intel, USA
Cynthia Irvine, Naval Postgraduate School, USA
Bernhard Kauer, Technische Universtat Dresden, Germany
Michael LeMay, University of Illinois Urbana-Champaign, USA
Michael Locasto, George Mason University, USA
Andrew Martin, University of Oxford, UK
Jon McCune, Carnegie Mellon University, USA
Chris Mitchell, Royal Holloway University, UK
David Naccache, ENS, France
Dimitris Pendarakis, IBM Watson, USA
Graeme Proudler, HP Laboratories, UK
Anand Rajan, Intel, USA
Scott Rotondo, Sun, USA
Ahmad-Reza Sadeghi, University of Bochum, Germany
Radu Sion, Stony Brook University, USA
Christian Stueble, Sirrix, Germany
G. Edward Suh, Cornell University, USA
Leendert van Doorn, AMD, USA
Claire Vishik, Intel, UK

Program Committee (Socio-economic Strand)
Andrew A. Adams, Reading University, UK
Ian Brown, University of Oxford, UK
Johann Cas, Austrian Academy of Science
Lorrie Faith Cranor, Carnegie-Mellon University, USA
Tamara Dinev, Florida Atlantic University, USA
Peter Gutmann, University of Auckland, New Zealand
Tristan Henderson, St Andrews University, UK
Adam Joinson, Bath University, UK
Eleni Kosta, Katholieke Universiteit Leuven, Belgium
Meryem Marzouki, French National Scientific Research Center (CNRS)
Tyler Moore, Harvard University, USA
Deirdre Mulligan, UC Berkely, USA
Anne-Marie Oostveen, Oxford University, UK
Andrew Patrick, Carleton University, Canada
Angela Sasse, University College London, UK
Jonathan Zittrain, Harvard University, USA

Important Dates:
Submission due: 24 February 2010 (Extended Deadline)
Notification: 22 March 2010
Camera ready: 5 April 2010
Conference: 21-23 June 2010

Paper Submission:

Related Resources

NordSec 2022   The 27th Nordic Conference on Secure IT Systems
IEEE BC4TAI 2022   Workshop on Blockchain Technologies for Trustworthy Decentralized AI Ecosystems
ISCAI 2022   2022 4th International Symposium on Computing and Artificial Intelligence (ISCAI 2022)
NLMLT 2022   International Conference on NLP and Machine Learning Trends
DNLP 2023   4th International Conference on Data Mining and NLP
TrustCom 2022   The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
doors 2023   3rd Edge Computing Workshop
C&ESAR 2022   Ensuring Trust in a Decentralized World
SIGML 2023   4th International Conference on Signal Processing and Machine Learning