posted by user: jonmccune || 17622 views || tracked by 38 users: [display]

TRUST 2011 : TRUST 2011: 4th International Conference on Trust and Trustworthy Computing

FacebookTwitterLinkedInGoogle


Conference Series : Trust and Trustworthy Computing
 
Link: http://www.trust2011.org/
 
When Jun 22, 2011 - Jun 24, 2011
Where Pittsburgh, PA, USA
Submission Deadline Feb 15, 2011
Notification Due Mar 25, 2011
Final Version Due Apr 12, 2011
Categories    trust   security   privacy   socio-economic
 

Call For Papers

**************************************************************************
Call for Papers

Trust 2011
4th International Conference on Trust and Trustworthy Computing

June 22-24, 2011
CyLab/CMU, Pittsburgh, PA, USA
http://www.trust2011.org

**************************************************************************
Submissions due: 15 February 2011 (11:59pm EST)
**************************************************************************

Building on the success of Trust 2010 (held in Berlin, Germany), Trust
2009 (Oxford, UK) and Trust 2008 (Villach, Austria), this conference
focuses on trusted and trustworthy computing, both from the technical
and social perspectives. The conference itself has two main strands,
one devoted to technical aspects and one devoted to socio-economic
aspects of trusted computing.

The conference solicits original papers on any aspect (technical or social
and economic) of the design, application and usage of trusted and
trustworthy computing, which concerns a broad range of concepts including
trustworthy infrastructures, cloud computing, services, hardware, software
and protocols. Topics of interest include, but are not limited to:

Technical Strand:
-----------------
* Architecture and implementation technologies for trusted platforms
and trustworthy infrastructures
* Trust, Security and Privacy in embedded systems
* Trust, Security and Privacy in social networks
* Trusted mobile platforms and mobile phone security
* Implementations of trusted computing (hardware and software)
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
(including resilience)
* Attestation and integrity verification
* Cryptographic aspects of trusted and trustworthy computing
* Design, implementation and analysis of security hardware, i.e.,
hardware with cryptographic and security functions, physically
unclonable functions (PUFs)
* Intrusion resilience in trusted computing
* Virtualization for trusted platforms
* Secure storage
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* Usability and end-user interactions with trusted platforms
* Limitations of trusted computing


Socio-economic Strand:
----------------------
* Usability and user perceptions of trustworthy systems and risks
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* Economic drivers for trustworthy systems in corporate environment
* The impact of trustworthy systems in enhancing trust in cloud-like
infrastructures
* The adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* The impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Game theoretical approaches to modeling or designing trustworthy
systems
* Approaches to model and simulate scenarios of how trustworthy systems
would be used in corporate environments and in personal space
* Experimental economics studies of trustworthiness
* The interplay between privacy, privacy enhancing technologies and
trustworthy systems
* Critiques of trustworthy systems


General Chairs:
Jonathan McCune (Carnegie Mellon University, USA)
Boris Balacheff (HP Labs, UK)

Program Chairs (Technical Strand)
Adrian Perrig (Carnegie Mellon University, USA)
Ahmad-Reza Sadeghi (TU Darmstadt / Fraunhofer SIT, Germany)

Program Chairs (Socio-economic Strand)
Angela Sasse (UCL, UK)
Yolanta Beres (HP Labs, UK)

Program Committee (Technical Strand)
Frederik Armknecht (University of Mannheim, Germany)
Marina Blanton (University of Notre Dame, USA)
Sergey Bratus (Dartmouth College, USA)
Christian Cachin (IBM Research, Switzerland)
Liqun Chen (HP Laboratories, UK)
Xuhua Ding (Singapore Management University, Singapore)
Paul England (Microsoft, USA)
Michael Franz (University of California, Irvine, USA)
Christian Gehrmann (SICS, Sweden)
David Grawrock (Intel, USA)
Helena Handschuh (Intrinsic-ID, USA / KU Leuven, Belgium)
Gernot Heiser (NICTA, Australia)
Thorsten Holz (Ruhr-University Bochum, Germany)
Cynthia Irvine (Naval Postgraduate School, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Michael LeMay (University of Illinois Urbana-Champaign, USA)
David Lie (University of Toronto, Canada)
Peter Lipp (TU Graz, Austria)
Michael Locasto (University of Calgary, Canada)
Andrew Martin (University of Oxford, UK)
Jon Millen (The MITRE Corporation, USA)
Chris Mitchell (Royal Holloway University, UK)
David Naccache (ENS, France)
Bart Preneel (KU Leuven, Belgium)
Graeme Proudler (HP Laboratories, UK)
Anand Rajan (Intel Labs, USA)
Scott Rotondo (Oracle, USA)
Mark Ryan (University of Birmingham, UK)
Jean-Pierre Seifert (TU Berlin / T-Labs, Germany)
Reiner Sailer (IBM Research, USA)
Matthias Schunter (IBM Research, Switzerland)
Sean Smith (Dartmouth College, USA)
Christian Stueble (Sirrix, Germany)
G. Edward Suh (Cornell University, USA)
Berk Sunar (WPI, USA)
Leendert van Doorn (AMD, USA)
Claire Vishik (Intel, UK)
Michael Waidner (Fraunhofer SIT / TU Darmstadt, Germany)
Marcel Winandy (Ruhr-University Bochum, Germany)
Xinwen Zhang (Huawei America Research Center, USA)

Program Committee (Socio-economic Strand)
Alessandro Acquisti (Carnegie Mellon University, USA)
Andrew A. Adams (Meiji University, Japan)
Rainer Boehme (University of Muenster, Germany)
Ian Brown (University of Oxford, UK)
Johann Cas (Austrian Academy of Science)
Tamara Dinev (Florida Atlantic University, USA)
Jens Grossklags (Pennsylvania State University, USA)
Peter Gutmann (University of Auckland, New Zealand)
Tristan Henderson (University of St Andrews, UK)
Adam Joinson (Bath University, UK)
Eleni Kosta (Katholieke Universiteit Leuven, Belgium)
Meryem Marzouki (French National Scientific Research Center)
Tyler Moore (Harvard University, USA)
Andrew Patrick (Office of the Privacy Commissioner of Canada)
Jens Riegelsberger (Google Research, UK)


Important Dates:
Submission due: 15 February 2011 (11:59pm EST)
Notification: 25 March 2011
Camera ready: 12 April 2011
Conference: 22-24 June 2010

Paper Submission:
http://www.trust2011.org

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
FLAIRS-ST XAI, Fairness, and Trust 2025   FLAIRS-38 Special Track on Explainable, Fair, and Trustworthy AI
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
TrustCom 2024   The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications
AISyS 2025   The Second International Conference on AI-based Systems and Services
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
AIMEDIA 2025   The First International Conference on AI-based Media Innovation
FSTJ 2024   Food Science and Technology: An International Journal
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering