STC: Scalable Trusted Computing

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2013 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
STC 2012 The Seventh ACM Workshop on Scalable Trusted Computing
Oct 15, 2012 - Oct 15, 2012 Raleigh, NC, USA Jul 16, 2012
STC 2011 The 6th ACM Workshop on Scalable Trusted Computing
Oct 17, 2011 - Oct 17, 2011 Chicago, IL, USA Jul 18, 2011
STC 2010 5th Annual Workshop on Scalable Trusted Computing
Oct 4, 2010 - Oct 4, 2010 Chicago, IL, USA Jun 14, 2010
STC 2009 The Fourth ACM Workshop on Scalable Trusted Computing
Nov 13, 2009 - Nov 13, 2009 Chicago, USA Jun 15, 2009
STC 2008 The Third ACM Workshop on Scalable Trusted Computing
Oct 31, 2008 - Oct 31, 2008 Fairfax, VA, USA Jun 16, 2008
 
 

Present CFP : 2012

Built on the continuous success of ACM STC 2006-2011, this workshop focuses on fundamental technologies of trusted and high assurance computing and its applications in large-scale systems with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues.

The workshop solicits two types of original papers: full papers and short/work-in-progress/position-papers. Submitted papers must be in ACM double-column format with at most 12 pages (full paper) and 6 pages (short paper), including bibliography, appendix etc. Note that reviewers are not required to read the appendix. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to:

security policies and models of trusted computing
architecture and implementation technologies for trusted platform
limitations, alternatives and tradeoffs regarding trusted computing
trusted computing in cloud and data center
cloud-based attestation services
trusted smartphone devices and systems
trust in smart grid, energy, and Internet of Things
trusted emerging and future Internet infrastructure
trusted online social network
trust in authentications, users and computing services
hardware based trusted computing
software based trusted computing
pros and cons of hardware based approach
remote attestation of trusted devices
censorship-freeness in trusted computing
cryptographic support in trusted computing
case study in trusted computing
principles for handling scales
scalable trust supports and services in cloud
trusted embedded computing and systems
virtualization and trusted computing

 

Related Resources

ICCBDC--ACM, Ei Compendex and Scopus 2018   2018 2nd International Conference on Cloud and Big Data Computing (ICCBDC 2018)--ACM, Ei Compendex and Scopus
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ACM--ICCBDC--Ei Compendex and Scopus 2018   2018 2nd International Conference on Cloud and Big Data Computing (ICCBDC 2018)--ACM, Ei Compendex and Scopus
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Middleware 2018   ACM/IFIP/USENIX Middleware 2018 Conference
USENIX-Security 2018   27th USENIX Security Symposium
ACM--ICSSE--Ei, Scopus 2018   ACM--2018 the International Conference on Software and Services Engineering(ICSSE 2018)--Ei, ISI and Scopus
ACII 2018   Advanced Computational Intelligence: An International Journal
ACM HT 2018   29th ACM Conference on Hypertext and Social Media 2018
WI 2018   2018 IEEE/WIC/ACM International Conference on Web Intelligence