posted by organizer: schunter || 11068 views || tracked by 12 users: [display]

TRUST 2015 : Trust and Trustworthy Computing - Deadline Extended: May 18, 2015!

FacebookTwitterLinkedInGoogle


Conference Series : Trust and Trustworthy Computing
 
Link: http://www.ics.forth.gr/trust2015/
 
When Aug 24, 2015 - Aug 26, 2015
Where Heraklion, Crete, Greece
Submission Deadline May 18, 2015
Notification Due Jun 17, 2015
Final Version Due Jun 28, 2015
Categories    security   cryptography   privacy   trusted computing
 

Call For Papers

SUBMISSION DEADLINE EXTENDED TO MAY 18

In addition to papers/short papers, the TRUST 2015 also accepts 2p abstracts
for poster submissions. The accepted abstracts will be included in the final
proceedings. See: http://www.ics.forth.gr/trust2015/call-posters.html

======================================================================
Call for Papers: TRUST 2015
8th International Conference on Trust & Trustworthy Computing
24-26 August, 2015 - Heraklion, Crete, Greece
======================================================================

http://www.ics.forth.gr/trust2015/ / http://bit.ly/trust2015

About TRUST
----------------------------------------
TRUST 2015 is an international conference on the technical and
socio-economic aspects of trustworthy infrastructures. It provides
an excellent interdisciplinary forum for researchers, practitioners,
and decision makers to explore new ideas and discuss experiences in
building, designing, using and understanding trustworthy computing
systems.

Important Dates
----------------------------------------
* Paper submissions due: 18 May 2015 (EXTENDED)
* Acceptance notification: 17 June 2015
* Final paper due: 28 June 2015
* Conference: August 24-26 2015

Topics of Interest
----------------------------------------
TRUST 2015 solicits original papers on any aspect (technical,
social or socio-economic) of the design, application and usage
of trusted and trustworthy computing. Papers can address design,
application and usage of trusted and trustworthy computing in a
broad range of concepts including, but not limited to, trustworthy
infrastructures, cloud computing, services, hardware, software and
protocols.

The conference includes a Technical and a Socioeconomic Strand.
Following is a partial list of topics of interest for the two
strands. For the full list of topics, please refer to the
conference website: http://www.ics.forth.gr/trust2015/

Technical Strand topics of interest include:
* (NEW TOPIC) Applications and security analysis of trusted
computing. Early explorations and results on new paradigms
or emerging technologies (e.g. Intel SGX) are particularly
encouraged.
* (NEW TOPIC) Trust, Security and Privacy in embedded systems
and IoT systems.
* Trust, Security and Privacy in social networks.
* Trusted mobile platforms and mobile phone security.
* Trustworthy infrastructures and services for cloud computing
(including resilience).
* Attestation and integrity verification.
* Cryptographic aspects of trusted and trustworthy computing.
* Security hardware with cryptographic and security functions,
physically unclonable functions (PUFs).
* Intrusion resilience in trusted computing.
* Virtualization for trusted platforms.
* Security policy and management of trusted computing.
* Privacy aspects of trusted computing.
* Verification of trusted computing architectures.
* Usability and end-user interactions with trusted platforms.
* Limitations of trusted computing.
* Usability and user perceptions of trustworthy systems and risks.

Socioeconomic Strand topics of interest include:
* (NEW TOPIC) Trust in the Web: protocols and implementations of
mechanisms to measure and leverage trust from the web (e.g.,
using social networks to establish trust for other services).
* The role of trust in human-computer interactions.
* Patterns of trust practices in human-computer interactions.
* Effects of trustworthy systems upon user, corporate,
and governmental behavior.
* The impact of trustworthy systems in enhancing trust in
cloud-like infrastructures.
* The adequacy of guarantees provided by trustworthy systems
for systems critically dependent upon trust, such as elections
and government oversight.
* The impact of trustworthy systems upon digital forensics,
police investigations and court proceedings.
* Game theoretical modeling/design of trustworthy systems.
* Modeling and simulation of scenarios on how trustworthy systems
would be used in corporate environments and in personal space.
* Economic drivers for trustworthy systems in corporate
environments.
* Experimental economics studies of trustworthiness.
* The interplay between privacy, privacy enhancing technologies
and trustworthy systems.
* Evaluation of research methods used in the research of
trustworthy and trusted computing.
* Critiques of trustworthy systems.
* Metrics of trust.
* Privacy Aspects of Trust Computing.
* Engineering Processes for Trustworthy Computing.

Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal,
conference or workshop. Simultaneous submission of the same work
is not allowed. Authors of accepted papers must guarantee that their
papers will be presented at the conference.

Format of paper submissions
----------------------------------------
Two formats of submissions are solicited:
* Full papers (up to 18 pages in LNCS format) that report
on in-depth, mature research results.
* Short papers (up to 9 pages in LNCS format) that describe
brief results or exciting work-in-progress.

To submit your work, visit: https://www.easychair.org/conferences/?conf=trust2015

All paper submissions to TRUST 2015 must be in LNCS format and written
in English. The templates for LNCS format can be downloaded from:
http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0

All submissions must be within the page limits mentioned above.
No changes to margins, spacing, or font sizes (or anything else)
are allowed. The program committee reserves the right to request
the source files for a submission to verify compliance with this
requirement.

Moreover, all submissions must be anonymized. An author's name should
occur only in references to that author's related work, which should
be referenced in the third person and not be overtly distinguishable
from the referenced work of others.

Only PDF submissions will be accepted. For the latest submission
instructions and dates, please refer to the conference website:
http://www.ics.forth.gr/trust2015/

Organisation Committee
----------------------------------------
* General Chair: Ioannis Askoxylakis, FORTH, GR
* Program Chairs:
- Mauro Conti, University of Padua, IT
- Matthias Schunter, Intel, DE

For the full Program Committee, see: http://bit.ly/trust2015pc

TRUST 2015 Twitter Updates
----------------------------------------
Announcements regarding TRUST 2015 will be sent through @syssecproject
on Twitter: https://twitter.com/syssecproject

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
FLAIRS-ST XAI, Fairness, and Trust 2025   FLAIRS-38 Special Track on Explainable, Fair, and Trustworthy AI
IJCSITY 2024   International Journal of Computational Science and Information Technology
TrustCom 2024   The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
AISyS 2025   The Second International Conference on AI-based Systems and Services
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal