posted by user: jonmccune || 16396 views || tracked by 38 users: [display]

TRUST 2011 : TRUST 2011: 4th International Conference on Trust and Trustworthy Computing

FacebookTwitterLinkedInGoogle


Conference Series : Trust and Trustworthy Computing
 
Link: http://www.trust2011.org/
 
When Jun 22, 2011 - Jun 24, 2011
Where Pittsburgh, PA, USA
Submission Deadline Feb 15, 2011
Notification Due Mar 25, 2011
Final Version Due Apr 12, 2011
Categories    trust   security   privacy   socio-economic
 

Call For Papers

**************************************************************************
Call for Papers

Trust 2011
4th International Conference on Trust and Trustworthy Computing

June 22-24, 2011
CyLab/CMU, Pittsburgh, PA, USA
http://www.trust2011.org

**************************************************************************
Submissions due: 15 February 2011 (11:59pm EST)
**************************************************************************

Building on the success of Trust 2010 (held in Berlin, Germany), Trust
2009 (Oxford, UK) and Trust 2008 (Villach, Austria), this conference
focuses on trusted and trustworthy computing, both from the technical
and social perspectives. The conference itself has two main strands,
one devoted to technical aspects and one devoted to socio-economic
aspects of trusted computing.

The conference solicits original papers on any aspect (technical or social
and economic) of the design, application and usage of trusted and
trustworthy computing, which concerns a broad range of concepts including
trustworthy infrastructures, cloud computing, services, hardware, software
and protocols. Topics of interest include, but are not limited to:

Technical Strand:
-----------------
* Architecture and implementation technologies for trusted platforms
and trustworthy infrastructures
* Trust, Security and Privacy in embedded systems
* Trust, Security and Privacy in social networks
* Trusted mobile platforms and mobile phone security
* Implementations of trusted computing (hardware and software)
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
(including resilience)
* Attestation and integrity verification
* Cryptographic aspects of trusted and trustworthy computing
* Design, implementation and analysis of security hardware, i.e.,
hardware with cryptographic and security functions, physically
unclonable functions (PUFs)
* Intrusion resilience in trusted computing
* Virtualization for trusted platforms
* Secure storage
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* Usability and end-user interactions with trusted platforms
* Limitations of trusted computing


Socio-economic Strand:
----------------------
* Usability and user perceptions of trustworthy systems and risks
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* Economic drivers for trustworthy systems in corporate environment
* The impact of trustworthy systems in enhancing trust in cloud-like
infrastructures
* The adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* The impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Game theoretical approaches to modeling or designing trustworthy
systems
* Approaches to model and simulate scenarios of how trustworthy systems
would be used in corporate environments and in personal space
* Experimental economics studies of trustworthiness
* The interplay between privacy, privacy enhancing technologies and
trustworthy systems
* Critiques of trustworthy systems


General Chairs:
Jonathan McCune (Carnegie Mellon University, USA)
Boris Balacheff (HP Labs, UK)

Program Chairs (Technical Strand)
Adrian Perrig (Carnegie Mellon University, USA)
Ahmad-Reza Sadeghi (TU Darmstadt / Fraunhofer SIT, Germany)

Program Chairs (Socio-economic Strand)
Angela Sasse (UCL, UK)
Yolanta Beres (HP Labs, UK)

Program Committee (Technical Strand)
Frederik Armknecht (University of Mannheim, Germany)
Marina Blanton (University of Notre Dame, USA)
Sergey Bratus (Dartmouth College, USA)
Christian Cachin (IBM Research, Switzerland)
Liqun Chen (HP Laboratories, UK)
Xuhua Ding (Singapore Management University, Singapore)
Paul England (Microsoft, USA)
Michael Franz (University of California, Irvine, USA)
Christian Gehrmann (SICS, Sweden)
David Grawrock (Intel, USA)
Helena Handschuh (Intrinsic-ID, USA / KU Leuven, Belgium)
Gernot Heiser (NICTA, Australia)
Thorsten Holz (Ruhr-University Bochum, Germany)
Cynthia Irvine (Naval Postgraduate School, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Michael LeMay (University of Illinois Urbana-Champaign, USA)
David Lie (University of Toronto, Canada)
Peter Lipp (TU Graz, Austria)
Michael Locasto (University of Calgary, Canada)
Andrew Martin (University of Oxford, UK)
Jon Millen (The MITRE Corporation, USA)
Chris Mitchell (Royal Holloway University, UK)
David Naccache (ENS, France)
Bart Preneel (KU Leuven, Belgium)
Graeme Proudler (HP Laboratories, UK)
Anand Rajan (Intel Labs, USA)
Scott Rotondo (Oracle, USA)
Mark Ryan (University of Birmingham, UK)
Jean-Pierre Seifert (TU Berlin / T-Labs, Germany)
Reiner Sailer (IBM Research, USA)
Matthias Schunter (IBM Research, Switzerland)
Sean Smith (Dartmouth College, USA)
Christian Stueble (Sirrix, Germany)
G. Edward Suh (Cornell University, USA)
Berk Sunar (WPI, USA)
Leendert van Doorn (AMD, USA)
Claire Vishik (Intel, UK)
Michael Waidner (Fraunhofer SIT / TU Darmstadt, Germany)
Marcel Winandy (Ruhr-University Bochum, Germany)
Xinwen Zhang (Huawei America Research Center, USA)

Program Committee (Socio-economic Strand)
Alessandro Acquisti (Carnegie Mellon University, USA)
Andrew A. Adams (Meiji University, Japan)
Rainer Boehme (University of Muenster, Germany)
Ian Brown (University of Oxford, UK)
Johann Cas (Austrian Academy of Science)
Tamara Dinev (Florida Atlantic University, USA)
Jens Grossklags (Pennsylvania State University, USA)
Peter Gutmann (University of Auckland, New Zealand)
Tristan Henderson (University of St Andrews, UK)
Adam Joinson (Bath University, UK)
Eleni Kosta (Katholieke Universiteit Leuven, Belgium)
Meryem Marzouki (French National Scientific Research Center)
Tyler Moore (Harvard University, USA)
Andrew Patrick (Office of the Privacy Commissioner of Canada)
Jens Riegelsberger (Google Research, UK)


Important Dates:
Submission due: 15 February 2011 (11:59pm EST)
Notification: 25 March 2011
Camera ready: 12 April 2011
Conference: 22-24 June 2010

Paper Submission:
http://www.trust2011.org

Related Resources

FLAIRS-37 ST XAI, Fairness, and Trust 2024   FLAIRS-37 Special Track on Explainable, Fair, and Trustworthy AI
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
TrustNLP Workshop 2024   TrustNLP: Fourth Workshop on Trustworthy Natural Language Processing
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICHST--Ei 2024   2024 6th International Conference on Hardware Security and Trust (ICHST 2024)
JoL 2024   International Journal of Law
CSW 2024   2024 3rd International Conference on Cyber Security
ESORICS 2024   European Symposium on Research in Computer Security
SPTM 2024   12th International Conference of Security, Privacy and Trust Management