posted by user: Busra || 3770 views || tracked by 1 users: [display]

SPTM 2026 : 14th International Conference of Security, Privacy and Trust Management

FacebookTwitterLinkedInGoogle

Link: https://sptm2026.org/
 
When Jul 25, 2026 - Jul 26, 2026
Where Toronto, Canada
Submission Deadline Apr 25, 2026
Notification Due May 23, 2026
Final Version Due May 30, 2026
Categories    information technology   internet computing   computer science
 

Call For Papers

14thInternational Conference of Security, Privacy and Trust Management (SPTM 2026)

July 25 ~ 26, 2026, Toronto, Canada

Scope & Topics

14th International Conference of Security, Privacy and Trust Management (SPTM 2026)provides a premier global forum for researchers, practitioners, and industry experts to present the latest innovations, research findings, and emerging trends in security, privacy, and trust technologies. As digital ecosystems continue to expand across cloud platforms, mobile environments, distributed systems, and AI driven infrastructures, the need for robust trust frameworks and secure computing models has never been greater.

SPTM 2026 aims to bring together leading scholars and professionals to exchange ideas, discuss challenges, and explore cutting edge solutions that advance the state of the art in trust management, privacy engineering, cybersecurity, and secure system design. The conference encourages interdisciplinary contributions that bridge theory and practice, highlight real world applications, and address the evolving landscape of modern security threats and trust requirements.


Authors are invited to submit high quality research papers describing original results, innovative projects, survey studies, and industrial experiences that demonstrate significant advances in security, privacy, and trust management. Submissions may address theoretical foundations, practical implementations, experimental evaluations, or emerging applications.

Topics of interest include, but are not limited to, the following

    Trust Management, Identity and Access Control

  • Trust Models, Trust Negotiation and Trust Reasoning
  • Decentralized Trust Management and Zero Trust Architectures
  • Identity and Access Management (IAM), Authentication and Authorization
  • Continuous Authentication and Identity Threat Detection
  • Trust in Cloud Native, Multi Cloud and Distributed Systems
  • Trust and Reputation Systems for Online Platforms
  • Trust in Microservices, APIs and Service Oriented Architectures
  • Trust Management for IoT, Edge, Mobile and Sensor Networks
  • Cross Platform Digital Identity Trust and Verifiable Credentials

    Privacy Engineering and Data Protection

  • Privacy Preserving Machine Learning (PPML)
  • Differential Privacy, Secure Aggregation and Federated Learning
  • Privacy Enhancing Technologies (PETs)
  • Data Anonymization, De identification and Synthetic Data Privacy
  • Privacy in Social Platforms, Digital Ecosystems and Online Communities
  • Privacy by Design, Governance and Compliance Automation
  • Geo Distributed Data Privacy and Cross Border Data Trust
  • Privacy in Cloud, Edge and Distributed Intelligence Systems

    Security Engineering and System Protection

  • Secure Software Development Lifecycle (SSDLC)
  • Vulnerability Discovery, Exploit Mitigation and Secure Coding
  • Software Supply Chain Security and SBOM Management
  • Secure DevOps (DevSecOps) and Continuous Security Testing
  • Security of Cloud, Serverless, Container and Kubernetes Environments
  • Security for IoT, CPS, Autonomous Systems and Robotics
  • Hardware Security, TEEs, Side Channel Attacks and Defenses
  • Chaos Engineering, Resilience Testing and Self Healing Systems
  • Autonomous Cyber Defense Agents

    Cryptography, Blockchain and Distributed Trust

  • Applied Cryptography and Cryptographic Protocols
  • Blockchain Security, Smart Contract Verification and Web3 Trust Models
  • Distributed Ledger Technologies (DLT) and Consensus Security
  • Zero Knowledge Proofs, MPC and Homomorphic Encryption
  • Decentralized Identity (DID) and Verifiable Credentials
  • Post Quantum Cryptography and Quantum Resistant Trust Frameworks
  • Quantum Networks, QKD and Quantum Trust Models

    AI, Machine Learning and Trustworthy Intelligence

  • Adversarial Machine Learning and Model Robustness
  • AI Safety, Alignment and Secure AI Pipelines
  • Trustworthy AI, Explainability and Accountability
  • Detection of Deepfakes, Synthetic Media and AI Generated Threats
  • AI Driven Threat Detection, Security Analytics and Anomaly Detection
  • Trust Management in Multi Agent and Autonomous AI Systems
  • Secure LLM Deployment, Jailbreak Prevention and Policy Enforcement
  • AI Generated Content Provenance, Watermarking and Authenticity Verification
  • Trust in Multimodal Foundation Models (Vision LLMs, Audio LLMs, Video LLMs)

    Network, Cloud and Distributed Security

  • Network Security, Intrusion Detection and Traffic Analysis
  • Cloud Security, Virtualization Security and Multi Cloud Trust
  • Secure Edge Computing, Fog Computing and Distributed Intelligence
  • Secure Communication Protocols and End to End Encryption
  • 5G/6G Security, Mobile Network Trust and Spectrum Security
  • DNS Security, Routing Security and Internet Infrastructure Trust
  • Secure Federated Knowledge Graphs and Distributed Trust Reasoning

    Human Centered Security, Usability and Social Trust

  • Human Factors in Security and Privacy
  • Social Engineering, Phishing and Behavioral Security
  • Trust in Social Networks, Online Communities and Digital Platforms
  • Usable Security and Privacy Interfaces
  • Misinformation, Disinformation and Trust in Digital Media
  • Psychological Models of Trust and Risk Perception
  • Human Machine Trust Calibration and Cognitive Security

    Policy, Governance, Ethics and Regulation

  • Security and Privacy Policy Management
  • Governance, Risk and Compliance (GRC)
  • Ethical AI, Responsible Data Use and Algorithmic Governance
  • Legal, Regulatory and Societal Aspects of Security and Privacy
  • Digital Trust Frameworks and Global Trust Standards
  • Cyber Diplomacy and International Trust Agreements

    Emerging Domains and Future Directions

  • Security and Trust in Metaverse, AR/VR and Immersive Environments
  • Trust in Digital Twins, Simulation Driven Systems and Cyber Physical Twins
  • Security for Autonomous Vehicles, Drones and Smart Mobility
  • Space Systems Security, Satellite Swarm Trust and Orbital Mesh Networks
  • Bio Cybersecurity and Trust in Genomic Data Ecosystems
  • Security for AI Operated Infrastructure (Power Grids, ICS, Smart Cities)
  • Synthetic Data Security, Leakage Risks and Trust Evaluation
  • Trust in AI Driven Autonomous Infrastructure and Cloud Orchestration

Paper Submission

Authors are invited to submit papers through the conference Submission System by April 25, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from SPTM 2026, after further revisions, will be published in the special issue of the following journals.

Important Dates

Submission Deadline: April 25, 2026
Authors Notification: May 23, 2026.
Final Manuscript Due: May 30, 2026

Co - Located Event

***** The invited talk proposals can be submitted to sptm@sptm2026.org

Related Resources

TRUST-AI 2026   THE SECOND EUROPEAN WORKSHOP ON TRUSTWORTHY AI
IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
Privacy Symposium (PrivIno) 2026   International Conference on Data Governance, Regulatory Compliance, and Innovative Technologies
CNCIT 2026   2026 5th International Conference on Networks, Communications and Information Technology
IJITE 2026   International Journal on Integrating Technology in Education
IJITCS 2026   International Journal of Information Technology Convergence and services
CVIPPR 2026   2026 4th Asia Conference on Computer Vision, Image Processing and Pattern Recognition (CVIPPR 2026)
SPTM 2026   14th International Conference of Security, Privacy and Trust Management
CIOS 2026   4th International Conference on Cloud, IoT and Security
CDKP 2026   15th International Conference on Data Mining & Knowledge Management Process