TRUST: Trust and Trustworthy Computing

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
TRUST 2016 The 9th International Conference on Trust & Trustworthy Computing
Aug 29, 2016 - Aug 30, 2016 Vienna, Austria May 9, 2016
TRUST 2015 Trust and Trustworthy Computing - Deadline Extended: May 18, 2015!
Aug 24, 2015 - Aug 26, 2015 Heraklion, Crete, Greece May 18, 2015
TRUST 2014 7th International Conference on Trust & Trustworthy Computing
Jun 30, 2014 - Jul 2, 2014 Hersonissos, Crete, Greece Mar 14, 2014
TRUST 2013 The 6th International Conference on Trust and Trustworthy Computing
Jun 17, 2013 - Jun 19, 2013 London, UK Feb 15, 2013
TRUST 2012 5th International Conference on Trust and Trustworthy Computing
Jun 13, 2012 - Jun 15, 2012 Vienna, Austria Feb 22, 2012
TRUST 2011 TRUST 2011: 4th International Conference on Trust and Trustworthy Computing
Jun 22, 2011 - Jun 24, 2011 Pittsburgh, PA, USA Feb 15, 2011
Trust 2010 3rd International Conference on Trust and Trustworthy Computing
Jun 21, 2010 - Jun 23, 2010 Berlin, Germany Feb 24, 2010
 
 

Present CFP : 2016

TRUST, the international conference on Trust and Trustworthy Computing, is an stablished forum on trusted and trustworthy computing. TRUST, currently in its 9th instantiation, brings together researchers, practitioners, and decision makers interested in new ideas for designing, building, using and understanding trusted and trustworthy computing systems. TRUST invites submissions of original work on the design, operation, and effect of trusted and trustworthy computing in any relevant field.

Topics of interest include, but are not limited to:

-Architectures for trustworthy infrastructures
-Emerging applications and technologies, including recent industrial research and development on trusted/trustworthy computing
-Hardware security, including secure storage, cryptographic coprocessors, smartcards, and physically unclonable functions (PUFs)
-Trustworthy applications, including webbased systems
-Trusted mobile computing platforms
-Trustworthy embedded, CyberPhysical, and Internet of Things systems
-Security analysis and formal techniques for trusted/trustworthy computing
-Verification of trusted/trustworthy computing (architectures, platforms, software, protocols)
-Usability of trusted/trustworthy computing solutions and humancomputer interactions
-Cloud security and trustworthy services
-Trust management
-Software engineering techniques for trustworthiness
-Operating system security, including virtualization and monitoring
-Cryptography for trusted computing and related applications
-Intrusion detection and resilience leveraging trusted computing
-Security policies and management of trusted/trustworthy systems
-Experimental, userbased or testbed studies

Submission

We invite submissions of (i) full papers (up to 18 pages in LNCS format) and (ii) short papers (up to 9 pages in LNCS format).

Full papers are expected to report substantial and wellsubstantiated original results. Short papers can present work that is not fully fleshed out but brings forth novel and stimulating
ideas. Please submit short papers as such and please be aware that no full paper will be converted to a short paper as part of the review process.

All submissions must be carefully anonymized for double-blind reviewing. To submit a paper please visit our submission page.
 

Related Resources

IEEE BC4TAI 2022   Workshop on Blockchain Technologies for Trustworthy Decentralized AI Ecosystems
XAI_Bias_Trust@FLAIRS 2022   FLAIRS Special Track on Explainability, Bias, and Trust in Artificial Intelligence
C&ESAR 2022   Ensuring Trust in a Decentralized World
Computing & AI in Digital Therapeutics 2022   Journal Special Issue (Frontiers in Medicine & Frontiers in Digital Health ): Computing and Artificial Intelligence in Digital Therapeutics
Sensors (MDPI) SI 2022   Ethics, Privacy and Trust in IoT-Based Smart Homes and Buildings
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
TrustCom 2022   The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
IJCAI-AIofAI 2022   2nd Workshop on Adverse Impacts and Collateral Effects of AI Technologies
ICHST--Ei, Scopus 2022   2022 4th International Conference on Hardware Security and Trust (ICHST 2022)--Ei Compendex, Scopus
EDSIGCON 2022   Information Systems & Computing Education (EDSIG CON) and Information Systems Applied Research (CONISAR)