posted by user: stm10 || 7452 views || tracked by 14 users: [display]

STM 2010 : 6th Workshop on Security and Trust Management

FacebookTwitterLinkedInGoogle


Conference Series : Security and Trust Management
 
Link: http://www.isac.uma.es/stm10
 
When Sep 23, 2010 - Sep 24, 2010
Where Athens
Submission Deadline Jun 20, 2010
Notification Due Jun 20, 2010
Final Version Due Aug 18, 2010
Categories    security   trust management
 

Call For Papers

Program Co-Chairs
Jorge Cuellar, Siemens, Germany
Javier Lopez, University of Malaga, Spain
General Co-Chairs
Gilles Barthe, IMDEA Software, Spain
Alex Pretschner, Fraunhofer IESE, Germany
Local Organization Chair
Angeliki Tsochou, University of Piraeus, Greece
Publicity Chair
Carmen Fernandez-Gago, University of Malaga, Spain
Program Committee (Tentative)
Vijay Atluri, Rutgers University, USA
Levente Buttyan, BUTE, Hungary
Iliano Cervesato, Carnegie Mellon University, Qatar
Joris Claessens, Microsoft EMIC, Germany
Jim Clarke, WIT, Ireland
Cas Cremers, ETH Zurich, Switzerland
Anupam Datta, Carnegie Mellon University, USA
Sabrina de Capitani, Universita degli Studi diMilano, Italy
Theo Dimitrakos, BT, UK
Holger Dreger, Siemens, Germany
Simone Fischer-Huebner, Karlstad University, Sweden
Peter Herrmann, NTNU, Norway
Sushil Jajodia, George Mason University, USA
Martin Johns, SAP Research, Germany
Guenter Karjoth, IBM Research, Switzerland
Costas Lambrinoudakis, University of Aegean, Greece
Daniel Le Metayer, INRIA, France
Ninghui Li, Purdue University, USA
Peng Liu, Pennsylvania State University, USA
Volkmar Lotz, SAP Research, France
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxemburg, LU
Ron van der Meyden, University of New South Wales, Australia
Catherine Meadows, NRL, USA
Stig F. Mjolsnes, NTNU, Norway
Ricardo Neisse, Fraunhofer IESE, Germany
Cristina Nita-Rotaru, Purdue University, USA
Peter Ryan, University of Luxembourg, Luxembourg
Michael Rusinowitch, INRIA, France
Pierangela Samarati, Università degli Studi di Milano, Italy
Damien Sauveron, XLIM, University of Limoges, France
Jean-Marc Seigneur, University of Geneva, Switzerland
Ketil Stoelen, SINTEF, Norway
Ulrich Ultes-Nitsche, University of Fribourg, Switzerland
Luca Viganò, Università di Verona, Italy
Bogdan Warinschi, University of Bristol, UK
Will Winsborough, University of Texas at San Antonio, USA
Workshop scope
STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM’10 is the sixth workshop in this series and will be held in Athens, Greece in conjunction with EUROPKI'10 and CRITIS'10, and just after ESORICS'10.
Topics of interest include, but are not limited to:
- access control
- cryptography
- digital right management
- economics of security
- key management
- ICT for securing digital as well as physical assets
- identity management
- networked systems security
- privacy and anonymity
- reputation systems and architectures
- security and trust management architectures
- semantics and computational models for security
and trust
- trust assessment and negotiation
- trust in mobile code
- trust in pervasive environments
- trust models
- trust management policies
- trusted platforms and trustworthy systems
- trustworthy user devices
The primary focus is on high-quality original unpublished research, case studies, and implementation experiences. We encourage submissions discussing the application and deployment of security technologies in practice.
Instructions for paper submission
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submissions will be blind reviewed by at least three reviewers.
This year it is planned to have post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (under negotiation). All submissions should comply with the “Authors Instructions” that can be found at: http://www.springer.de/comp/lncs/authors.html and should not exceed 16 pages including references (Appendices are not included in the 16-page limit but, in case the paper is accepted for publication, they will be removed from the camera ready version).
The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords.

Submissions not meeting these guidelines risk rejection without consideration of their merits.
Papers must be submitted electronically in PDF format.

For paper submission please visit http://www.easychair.org/conferences/?conf=stm10

Important dates
Submission of papers: June 20, 2010
Notification to authors: July 20, 2010
Camera-ready copies: August 18, 2010

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
CSW 2024   2024 3rd International Conference on Cyber Security
IFIPTM 2024   15th Annual Conference of the IFIP WG 11.11 Trust Management in Nottingham, UK
AIFU 2024   10th International Conference on Artificial Intelligence and Applications
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
CIoT 2024   6th International Conference on Internet of Things
S&P 2025   The 45th IEEE Symposium on Security and Privacy