posted by user: tnhh || 7826 views || tracked by 15 users: [display]

Trust 2010 : 3rd International Conference on Trust and Trustworthy Computing

FacebookTwitterLinkedInGoogle


Conference Series : Trust and Trustworthy Computing
 
Link: http://www.trust2010.org
 
When Jun 21, 2010 - Jun 23, 2010
Where Berlin, Germany
Submission Deadline Feb 24, 2010
Notification Due Mar 22, 2010
Final Version Due Apr 5, 2010
Categories    trust   trusted-computing   socio-economics   security
 

Call For Papers

**************************************************************************
Call for Papers

Trust 2010
3rd International Conference on Trust and Trustworthy Computing

June 21-23, 2010, Berlin, Germany
http://www.trust2010.org

**************************************************************************

Building on the success of Trust 2009 (held at Oxford, UK) and Trust 2008
(Villach, Austria), this conference focuses on trusted and trustworthy
computing, both from the technical and social perspectives. The conference
itself will have two main strands, one devoted to technical aspects and
one devoted to the socio-economic aspects of trusted computing.

The conference solicits original papers on any aspect (technical or social
and economic) of the design, application and usage of trusted and
trustworthy computing, which concerns a broad range of concepts including
trustworthy infrastructures, services, hardware, software and protocols.
Topics of interest include, but are not limited to:

Technical Strand:
-----------------
* Architecture and implementation technologies for trusted platforms
and trustworthy infrastructures
* Mobile trusted computing
* Implementations of trusted computing (covering both hardware and
software)
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
* Attestation and possible variants (e.g., property-based
attestation, runtime attestation)
* Cryptographic aspects of trusted computing
* Security hardware, i.e., hardware with cryptographic and
security functions, physically unclonable functions (PUFs)
* Establishing trust in embedded systems (e.g., sensor networks)
* Hardware Trojans (detection, prevention)
* Intrusion resilience in trusted computing
* Virtualisation for trusted platforms
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* End-user interactions with trusted platforms
* Limitations of trusted computing

Socio-economic Strand:
----------------------
* Usability and user perceptions of trustworthy systems and risks
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* The adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* The impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Economic drivers for trustworthy systems
* Group and organizational behavior within trustworthy systems
* The impact of trustworthy systems upon user autonomy, social
capital, and power relationships
* Cross-cultural definitions of trustworthiness
* Can systems be truly "trustworthy" without any capacity for moral
reasoning?
* Trustworthy systems and precursors of trust such as honesty,
benevolence, value similarity, or competence
* Trustworthiness, regret and forgiveness
* Trustworthy systems as enhancements or constraints on government
power
* The role of independence from vested interests as a driver of trust
* Game theoretical approaches to modeling or designing trustworthy
systems
* Experimental economics studies of trustworthiness
* The interplay between privacy, privacy enhancing technologies and
trustworthiness
* Regulatory vs peer-produced trustworthiness, including reputation
systems
* Global governance initiatives to manage trust
* Critiques of trustworthy systems


General Chair:
Ahmad-Reza Sadeghi, University of Bochum, Germany

Program Chair (Technical Strand)
Sean Smith, Dartmouth College, USA

Program Chair (Socio-economic Strand)
Alessandro Acquisti, Carnegie Mellon University, USA

Program Committee (Technical Strand)
N. Asokan, Nokia Research Center, Finland
Sergey Bratus, Dartmouth College, USA
Liqun Chen, HP Laboratories, UK
David Grawrock, Intel, USA
Cynthia Irvine, Naval Postgraduate School, USA
Bernhard Kauer, Technische Universtat Dresden, Germany
Michael LeMay, University of Illinois Urbana-Champaign, USA
Michael Locasto, George Mason University, USA
Andrew Martin, University of Oxford, UK
Jon McCune, Carnegie Mellon University, USA
Chris Mitchell, Royal Holloway University, UK
David Naccache, ENS, France
Dimitris Pendarakis, IBM Watson, USA
Graeme Proudler, HP Laboratories, UK
Anand Rajan, Intel, USA
Scott Rotondo, Sun, USA
Ahmad-Reza Sadeghi, University of Bochum, Germany
Radu Sion, Stony Brook University, USA
Christian Stueble, Sirrix, Germany
G. Edward Suh, Cornell University, USA
Leendert van Doorn, AMD, USA
Claire Vishik, Intel, UK

Program Committee (Socio-economic Strand)
Andrew A. Adams, Reading University, UK
Ian Brown, University of Oxford, UK
Johann Cas, Austrian Academy of Science
Lorrie Faith Cranor, Carnegie-Mellon University, USA
Tamara Dinev, Florida Atlantic University, USA
Peter Gutmann, University of Auckland, New Zealand
Tristan Henderson, St Andrews University, UK
Adam Joinson, Bath University, UK
Eleni Kosta, Katholieke Universiteit Leuven, Belgium
Meryem Marzouki, French National Scientific Research Center (CNRS)
Tyler Moore, Harvard University, USA
Deirdre Mulligan, UC Berkely, USA
Anne-Marie Oostveen, Oxford University, UK
Andrew Patrick, Carleton University, Canada
Angela Sasse, University College London, UK
Jonathan Zittrain, Harvard University, USA


Important Dates:
Submission due: 24 February 2010 (Extended Deadline)
Notification: 22 March 2010
Camera ready: 5 April 2010
Conference: 21-23 June 2010

Paper Submission:
http://www.trust2010.org/submission.html

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
FLAIRS-ST XAI, Fairness, and Trust 2025   FLAIRS-38 Special Track on Explainable, Fair, and Trustworthy AI
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
TrustCom 2024   The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2