14thInternational Conference of Security, Privacy and Trust Management (SPTM 2026)
July 25 ~ 26, 2026, Toronto, Canada Scope & Topics14th International Conference of Security, Privacy and Trust Management (SPTM 2026)provides a premier global forum for researchers, practitioners, and industry experts to present the latest innovations, research findings, and emerging trends in security, privacy, and trust technologies. As digital ecosystems continue to expand across cloud platforms, mobile environments, distributed systems, and AI driven infrastructures, the need for robust trust frameworks and secure computing models has never been greater.
SPTM 2026 aims to bring together leading scholars and professionals to exchange ideas, discuss challenges, and explore cutting edge solutions that advance the state of the art in trust management, privacy engineering, cybersecurity, and secure system design. The conference encourages interdisciplinary contributions that bridge theory and practice, highlight real world applications, and address the evolving landscape of modern security threats and trust requirements.
Authors are invited to submit high quality research papers describing original results, innovative projects, survey studies, and industrial experiences that demonstrate significant advances in security, privacy, and trust management. Submissions may address theoretical foundations, practical implementations, experimental evaluations, or emerging applications.
Topics of interest include, but are not limited to, the following Trust Management, Identity and Access Control
- Trust Models, Trust Negotiation and Trust Reasoning
- Decentralized Trust Management and Zero Trust Architectures
- Identity and Access Management (IAM), Authentication and Authorization
- Continuous Authentication and Identity Threat Detection
- Trust in Cloud Native, Multi Cloud and Distributed Systems
- Trust and Reputation Systems for Online Platforms
- Trust in Microservices, APIs and Service Oriented Architectures
- Trust Management for IoT, Edge, Mobile and Sensor Networks
- Cross Platform Digital Identity Trust and Verifiable Credentials
Privacy Engineering and Data Protection
- Privacy Preserving Machine Learning (PPML)
- Differential Privacy, Secure Aggregation and Federated Learning
- Privacy Enhancing Technologies (PETs)
- Data Anonymization, De identification and Synthetic Data Privacy
- Privacy in Social Platforms, Digital Ecosystems and Online Communities
- Privacy by Design, Governance and Compliance Automation
- Geo Distributed Data Privacy and Cross Border Data Trust
- Privacy in Cloud, Edge and Distributed Intelligence Systems
Security Engineering and System Protection
- Secure Software Development Lifecycle (SSDLC)
- Vulnerability Discovery, Exploit Mitigation and Secure Coding
- Software Supply Chain Security and SBOM Management
- Secure DevOps (DevSecOps) and Continuous Security Testing
- Security of Cloud, Serverless, Container and Kubernetes Environments
- Security for IoT, CPS, Autonomous Systems and Robotics
- Hardware Security, TEEs, Side Channel Attacks and Defenses
- Chaos Engineering, Resilience Testing and Self Healing Systems
- Autonomous Cyber Defense Agents
Cryptography, Blockchain and Distributed Trust
- Applied Cryptography and Cryptographic Protocols
- Blockchain Security, Smart Contract Verification and Web3 Trust Models
- Distributed Ledger Technologies (DLT) and Consensus Security
- Zero Knowledge Proofs, MPC and Homomorphic Encryption
- Decentralized Identity (DID) and Verifiable Credentials
- Post Quantum Cryptography and Quantum Resistant Trust Frameworks
- Quantum Networks, QKD and Quantum Trust Models
AI, Machine Learning and Trustworthy Intelligence
- Adversarial Machine Learning and Model Robustness
- AI Safety, Alignment and Secure AI Pipelines
- Trustworthy AI, Explainability and Accountability
- Detection of Deepfakes, Synthetic Media and AI Generated Threats
- AI Driven Threat Detection, Security Analytics and Anomaly Detection
- Trust Management in Multi Agent and Autonomous AI Systems
- Secure LLM Deployment, Jailbreak Prevention and Policy Enforcement
- AI Generated Content Provenance, Watermarking and Authenticity Verification
- Trust in Multimodal Foundation Models (Vision LLMs, Audio LLMs, Video LLMs)
Network, Cloud and Distributed Security
- Network Security, Intrusion Detection and Traffic Analysis
- Cloud Security, Virtualization Security and Multi Cloud Trust
- Secure Edge Computing, Fog Computing and Distributed Intelligence
- Secure Communication Protocols and End to End Encryption
- 5G/6G Security, Mobile Network Trust and Spectrum Security
- DNS Security, Routing Security and Internet Infrastructure Trust
- Secure Federated Knowledge Graphs and Distributed Trust Reasoning
Human Centered Security, Usability and Social Trust
- Human Factors in Security and Privacy
- Social Engineering, Phishing and Behavioral Security
- Trust in Social Networks, Online Communities and Digital Platforms
- Usable Security and Privacy Interfaces
- Misinformation, Disinformation and Trust in Digital Media
- Psychological Models of Trust and Risk Perception
- Human Machine Trust Calibration and Cognitive Security
Policy, Governance, Ethics and Regulation
- Security and Privacy Policy Management
- Governance, Risk and Compliance (GRC)
- Ethical AI, Responsible Data Use and Algorithmic Governance
- Legal, Regulatory and Societal Aspects of Security and Privacy
- Digital Trust Frameworks and Global Trust Standards
- Cyber Diplomacy and International Trust Agreements
Emerging Domains and Future Directions
- Security and Trust in Metaverse, AR/VR and Immersive Environments
- Trust in Digital Twins, Simulation Driven Systems and Cyber Physical Twins
- Security for Autonomous Vehicles, Drones and Smart Mobility
- Space Systems Security, Satellite Swarm Trust and Orbital Mesh Networks
- Bio Cybersecurity and Trust in Genomic Data Ecosystems
- Security for AI Operated Infrastructure (Power Grids, ICS, Smart Cities)
- Synthetic Data Security, Leakage Risks and Trust Evaluation
- Trust in AI Driven Autonomous Infrastructure and Cloud Orchestration
Paper Submission Authors are invited to submit papers through the conference Submission System by April 25, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Selected papers from SPTM 2026, after further revisions, will be published in the special issue of the following journals. Important Dates | Submission Deadline | : | April 25, 2026 | | Authors Notification | : | May 23, 2026. | | Final Manuscript Due | : | May 30, 2026 |
Co - Located Event ***** The invited talk proposals can be submitted to sptm@sptm2026.org
|