INTRUST: International Conference on Trusted Systems

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2015 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
InTrust 2014 The 6th International conference on Trustworthy Computing
Dec 16, 2014 - Dec 17, 2014 Beijing Oct 20, 2014
InTrust 2013 5th International Conference on Trusted Systems
Dec 5, 2013 - Dec 6, 2013 Graz, Austria Jul 29, 2013
INTRUST 2011 The Third International Conference on Trusted Systems
Nov 27, 2011 - Nov 29, 2011 Beijing Aug 1, 2011
 
 

Present CFP : 2014

************************************************************************
The 6th International conference on Trustworthy Computing (InTrust 2014)

16th-17th December 2014, Beijing, P. R. China

Website: http://crypto.fudan.edu.cn/intrust2014/
************************************************************************


------------------
Important Dates
------------------

Extended Submissions Deadline: 20 October 2014
Extended Notification: 10 November 2014
Camera ready for pre-proceedings due: 20 November 2014
Conference: 16-17 December 2014
Camera ready for proceedings due: 20 January 2015


------------------
Overview
------------------

The InTrust conference focuses on the theory, technologies and applications of trustworthy systems. It is devoted to all aspects of trustworthy computing systems, including trusted modules, platforms, networks, services and applications, as well as security concerns and privacy issues of systems, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area.

INTRUST 2014 is the next event in a series of highly successful International Conferences, previously held as INTRUST (International conference on Trusted Systems) 2013 (Graz, Austria), INTRUST 2012 (London, UK), INTRUST 2011 (Beijing, China), INTRUST 2010 (Beijing, China), and INTRUST 2009 (Beijing, China). The conference will be hosted by Beijing Institute of Technology. INTRUST 2014 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems.



------------------
Topics of Interest
------------------

Topics of relevance include but are not limited to:
* Fundamental features and functionalities of trusted systems
* Primitives and mechanisms for building a chain of trust
* Design principles and architectures for trusted modules and platforms
* Trustworthy infrastructures and cloud computing services
* Implementation technologies for trusted modules and platforms
* Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems
* Secure network operation
* Mobile trusted systems
* Applications of trusted systems
* Trusted intellectual property protection: metering, watermarking, digital rights management and enterprise rights management
* Software & hardware protection for trusted systems
* Authentication and access control for trusted systems
* Identity & privacy aspects of trusted systems
* Attestation for trusted systems, including measurement and verification of the behavior of trusted systems
* Emerging technologies and standards for trusted systems
* Trust metrics and robust trust inference in distributed systems
* Usability and reliability aspects of trusted systems
* Trust modeling, economic analysis and protocol design for rational and malicious adversaries
* Virtualization for trusted systems
* Limitations of trusted systems
* Security analysis of trusted systems, including formal methods proofs, provable security and automated analysis
* Security policies for, and management of, trusted systems
* Intrusion resilience and revocation aspects of trusted systems
* Scalability aspects of trusted systems
* Compatibility aspects of trusted systems
* Experiences in building real-world trusted systems
* Socio-economic aspects of trusted systems


------------------
Submission Guidelines and Publication
------------------

Submissions must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any journal or other conference or workshop that has proceedings.

All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords.

The proceedings of InTrust 2014 will be published in the Springer-Verlag Lecture Notes in Computer Science series. Papers published in the LNCS series are indexed by both EI and ISTP. Clear instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers.

Selected papers will be invited to be published (in approval) in
* International Journal of Information Security
* Frontiers of Computer Science

Papers should be submitted in standard LNCS format, with length at most 15 pages (excluding bibliography and appendices). Committee members are not required to review more pages than this, so papers should be intelligible within this length. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that their paper will be presented at the conference.

Papers must be submitted in PDF format using the EasyChair conference management system at https://www.easychair.org/conferences/?conf=intrust2014

Please send any enquiries to: wangmz@bit.edu.cn


---------------------
Best Paper Award
---------------------

The conference has a best paper award to the value of US$1,000; all papers are eligible for this award.


---------------------
Conference Organization
---------------------

Honorary Chairs
* Liqun Chen, HP Laboratories, UK
* Yongfei Han, BJUT & ONETS, China

General Chairs
* Heyan Huang, Beijing Institute of Technology, China

Program Committee Chairs
* Yanjiang Yang, Institute for Infocomm Research, Singapore
* Moti Yung, Google & Columbia University, USA
* Liehuang Zhu, Beijing Institute of Technology, China

Publicity Chairs
* Xinyi Huang, Fujian Normal University, China
* Mingzhong Wang, Beijing Institute of Technology, China

Program Committee
* Endre Bangerter, Bern University of Applied Sciences, Switzerland
* Zhen Chen, Tsinghua University, China
* Zhong Chen, Peking University, China
* Dieter Gollmann, Hamburg University of Technology, Germany
* Sigrid Guergens, Fraunhofer Institute for Secure Information Technology, Germany
* Weili Han, Fudan University, China
* Xuejia Lai, Shanghai Jiaotong University, China
* Shujun Li, University of Konstanz, UK
* Jianxin Li, Beihang University, China
* Peter Lipp, Graz University of Technology, Austria
* Javier Lopez, University of Malaga, Spain
* Andrew Martin, University of Oxford, UK
* Shin'Ichiro Matsuo, NICT, Japan
* Yi Mu, University of Wollongong, Australia
* David Naccache, Ecole normale suprieure, France
* Raphael Phan, Loughborough University, UK
* Bart Preneel, Katholieke Universiteit Leuven, Belgium
* Scott Rotondo, Oracle, USA
* Kouichi Sakurai, Kyushu University, Japan
* Willy Susilo, University of Wollongong, Australia
* Qiang Tang, University of Twente, Netherlands
* Claire Vishik, Intel Corporation, UK
* Qian Wang, Wuhang University, China
* Jian Weng, Jinan University, China
* Fan Wu, Shanghai Jiaotong University, China
* Yi Xie, Sun Yat-Sen University, China
* Shouhuai Xu, University of Texas at San Antonio, USA
* Rui Xue, Chinese Academy of Sciences, China
* Huanguo Zhang, Wuhan University, China
* Xing Zhang, Beijing University of Technology, China
* Xinwen Zhang, Huawei Research Center, China
* Sheng Zhong, Nanjing University, China
* Yongbin Zhou, Chinese Academy of Sciences, China
* Yan Zhou, Beijing University, China

Steering Committee
* Yongfei Han, BJUT & ONETS, China
* Moti Yung, Google & Columbia University, USA
* Liqun Chen, HP Laboratories, UK
* Robert Deng, SMU, Singapore
* Chris Mitchell, RHUL, UK
 

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE CITREx 2025   IEEE Symposium on Explainable, Responsible, and Trustworthy Computational Intelligence
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
ICISSP 2025   11th International Conference on Information Systems Security and Privacy