| |||||||||||||
INTRUST 2011 : The Third International Conference on Trusted SystemsConference Series : International Conference on Trusted Systems | |||||||||||||
Link: http://www.onets.com.cn/intrust11 | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Introduction
Building on the success of INTRUST 2009 and INTRUST 2010 (both were held in Beijing, P. R. China), this conference focuses on the theory, technologies and applications of trusted systems. It is devoted to all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference is to bring academic and industrial researchers, designers, and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The conference will be hosted by the Beijing Institute of Technology and ONETS. INTRUST 2011 solicits original papers on any aspect of the theory, advanced development and applications of trusted computing, trustworthy systems and general trust issues in modern computing systems. The conference will have an academic track and an industrial track. This call for papers is for contributions to both of the tracks. Submissions to the academic track should emphasize theoretical and practical research contributions to general trusted system technologies, while submissions to the industrial track may focus on experiences in the implementation and deployment of real-world systems. Instructions for authors Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or other conference or workshop that has proceedings. Submissions will take place entirely via a web system. All submissions will be blind-reviewed. Papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. A submitted paper should begin with a title, a short abstract, and a list of keywords. As was the vase for INTRUST 2009 and 2010, the proceedings of INTRUST 2011 will, as a plan, be published in the Springer-Verlag Lecture Notes in Computer Science series and will be available after the conference. Clear instructions for the preparation of a final proceedings version will be sent to the authors of accepted papers. We strongly recommend that authors submit their papers in the standard LNCS format (see http://www.springer.com/computer/lncs?SGWID=0-164-0-0-0 for the details) with length at most 15 pages (excluding bibliography and appendices). Committee members are not required to review more than that, so the paper should be intelligible and self-contained within this length. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that their paper will be presented at the conference. Authors are asked to clearly indicate whether their submissions are for the academic track or the industrial track in the title. Best paper award The conference has a best paper award sponsored by Singapore Management University for US$1000; all papers are eligible for this award. Topics of relevance include but are not limited to: - Fundamental features and functionalities of trusted systems - Primitives and mechanisms for building a chain of trust - Design principles and architectures of trusted modules and platforms - Implementation technologies for trusted modules and platforms - Cryptographic aspects of trusted systems, including cryptographic algorithms and protocols, and their implementation and application in trusted systems - Scalable safe network operation in trusted systems - Mobile trusted systems, such as trusted mobile platforms, sensor networks, mobile (ad hoc) networks, peer-to-peer networks, Bluetooth, etc. - Storage aspects for trusted systems - Applications of trusted systems, e.g. trusted email, web services and various e-commerce services - Trustworthy infrastructures and services for cloud computing - Trusted intellectual property protection: metering, watermarking, digital rights management and enterprise rights management - Software protection for trusted systems - Hardware security for trusted systems - Authentication and access control for trusted systems - Key, identity and certificate management for trusted systems - Privacy aspects for trusted systems - Attestation aspects for trusted systems, including the measurement and verification of the behaviour of trusted systems - Standards organizations and their contributions to trusted systems, such as TCG, ISO/IEC, IEEE 802.11, etc. - Emerging technologies for trusted systems, such as RFID, memory spots, smart cards, etc. - Trust metrics and robust trust inference in distributed systems - Usability and reliability aspects for trusted systems - Trust modeling, economic analysis and protocol design for rational and malicious adversaries - Virtualisation for trusted systems - Limitations of trusted systems - Security analysis of trusted systems, including formal method proofs, provable security and automated analysis - Security policies for, and management of, trusted systems - Intrusion resilience and revocation aspects for trusted systems - Scalability aspects of trusted systems - Compatibility aspects of trusted systems - Experiences in building real-world trusted systems - Socio-economic aspects of trusted systems Conference organization General Chairs - Robert Deng, Singapore Management University, Singapore - Heyuan Huang, Beijing Institute of Technology, China - Chris Mitchell, RHUL, UK Programme Committee Chairs - Moti Yung, Columbia University & Google Inc., USA - Liqun Chen, HP Laboratories, UK - Liehuang Zhu, Beijing Institute of Technology, China |
|