posted by user: jonmccune || 13508 views || tracked by 38 users: [display]

TRUST 2011 : TRUST 2011: 4th International Conference on Trust and Trustworthy Computing


Conference Series : Trust and Trustworthy Computing
When Jun 22, 2011 - Jun 24, 2011
Where Pittsburgh, PA, USA
Submission Deadline Feb 15, 2011
Notification Due Mar 25, 2011
Final Version Due Apr 12, 2011
Categories    trust   security   privacy   socio-economic

Call For Papers

Call for Papers

Trust 2011
4th International Conference on Trust and Trustworthy Computing

June 22-24, 2011
CyLab/CMU, Pittsburgh, PA, USA

Submissions due: 15 February 2011 (11:59pm EST)

Building on the success of Trust 2010 (held in Berlin, Germany), Trust
2009 (Oxford, UK) and Trust 2008 (Villach, Austria), this conference
focuses on trusted and trustworthy computing, both from the technical
and social perspectives. The conference itself has two main strands,
one devoted to technical aspects and one devoted to socio-economic
aspects of trusted computing.

The conference solicits original papers on any aspect (technical or social
and economic) of the design, application and usage of trusted and
trustworthy computing, which concerns a broad range of concepts including
trustworthy infrastructures, cloud computing, services, hardware, software
and protocols. Topics of interest include, but are not limited to:

Technical Strand:
* Architecture and implementation technologies for trusted platforms
and trustworthy infrastructures
* Trust, Security and Privacy in embedded systems
* Trust, Security and Privacy in social networks
* Trusted mobile platforms and mobile phone security
* Implementations of trusted computing (hardware and software)
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
(including resilience)
* Attestation and integrity verification
* Cryptographic aspects of trusted and trustworthy computing
* Design, implementation and analysis of security hardware, i.e.,
hardware with cryptographic and security functions, physically
unclonable functions (PUFs)
* Intrusion resilience in trusted computing
* Virtualization for trusted platforms
* Secure storage
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* Usability and end-user interactions with trusted platforms
* Limitations of trusted computing

Socio-economic Strand:
* Usability and user perceptions of trustworthy systems and risks
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* Economic drivers for trustworthy systems in corporate environment
* The impact of trustworthy systems in enhancing trust in cloud-like
* The adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* The impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Game theoretical approaches to modeling or designing trustworthy
* Approaches to model and simulate scenarios of how trustworthy systems
would be used in corporate environments and in personal space
* Experimental economics studies of trustworthiness
* The interplay between privacy, privacy enhancing technologies and
trustworthy systems
* Critiques of trustworthy systems

General Chairs:
Jonathan McCune (Carnegie Mellon University, USA)
Boris Balacheff (HP Labs, UK)

Program Chairs (Technical Strand)
Adrian Perrig (Carnegie Mellon University, USA)
Ahmad-Reza Sadeghi (TU Darmstadt / Fraunhofer SIT, Germany)

Program Chairs (Socio-economic Strand)
Angela Sasse (UCL, UK)
Yolanta Beres (HP Labs, UK)

Program Committee (Technical Strand)
Frederik Armknecht (University of Mannheim, Germany)
Marina Blanton (University of Notre Dame, USA)
Sergey Bratus (Dartmouth College, USA)
Christian Cachin (IBM Research, Switzerland)
Liqun Chen (HP Laboratories, UK)
Xuhua Ding (Singapore Management University, Singapore)
Paul England (Microsoft, USA)
Michael Franz (University of California, Irvine, USA)
Christian Gehrmann (SICS, Sweden)
David Grawrock (Intel, USA)
Helena Handschuh (Intrinsic-ID, USA / KU Leuven, Belgium)
Gernot Heiser (NICTA, Australia)
Thorsten Holz (Ruhr-University Bochum, Germany)
Cynthia Irvine (Naval Postgraduate School, USA)
Stefan Katzenbeisser (TU Darmstadt, Germany)
Michael LeMay (University of Illinois Urbana-Champaign, USA)
David Lie (University of Toronto, Canada)
Peter Lipp (TU Graz, Austria)
Michael Locasto (University of Calgary, Canada)
Andrew Martin (University of Oxford, UK)
Jon Millen (The MITRE Corporation, USA)
Chris Mitchell (Royal Holloway University, UK)
David Naccache (ENS, France)
Bart Preneel (KU Leuven, Belgium)
Graeme Proudler (HP Laboratories, UK)
Anand Rajan (Intel Labs, USA)
Scott Rotondo (Oracle, USA)
Mark Ryan (University of Birmingham, UK)
Jean-Pierre Seifert (TU Berlin / T-Labs, Germany)
Reiner Sailer (IBM Research, USA)
Matthias Schunter (IBM Research, Switzerland)
Sean Smith (Dartmouth College, USA)
Christian Stueble (Sirrix, Germany)
G. Edward Suh (Cornell University, USA)
Berk Sunar (WPI, USA)
Leendert van Doorn (AMD, USA)
Claire Vishik (Intel, UK)
Michael Waidner (Fraunhofer SIT / TU Darmstadt, Germany)
Marcel Winandy (Ruhr-University Bochum, Germany)
Xinwen Zhang (Huawei America Research Center, USA)

Program Committee (Socio-economic Strand)
Alessandro Acquisti (Carnegie Mellon University, USA)
Andrew A. Adams (Meiji University, Japan)
Rainer Boehme (University of Muenster, Germany)
Ian Brown (University of Oxford, UK)
Johann Cas (Austrian Academy of Science)
Tamara Dinev (Florida Atlantic University, USA)
Jens Grossklags (Pennsylvania State University, USA)
Peter Gutmann (University of Auckland, New Zealand)
Tristan Henderson (University of St Andrews, UK)
Adam Joinson (Bath University, UK)
Eleni Kosta (Katholieke Universiteit Leuven, Belgium)
Meryem Marzouki (French National Scientific Research Center)
Tyler Moore (Harvard University, USA)
Andrew Patrick (Office of the Privacy Commissioner of Canada)
Jens Riegelsberger (Google Research, UK)

Important Dates:
Submission due: 15 February 2011 (11:59pm EST)
Notification: 25 March 2011
Camera ready: 12 April 2011
Conference: 22-24 June 2010

Paper Submission:

Related Resources

Sensors (MDPI) SI 2021   Sensors SI on Security, Trust and Privacy in New Computing Environments
IEEE COINS 2021   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
IJACEEE 2021   International Journal of Applied Control, Electrical and Electronics Engineering
INTERNET 2021   The Thirteenth International Conference on Evolving Internet
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
WeST 2021   13th International Conference on Web services & Semantic Technology
IJAIT 2021   International Journal of Advanced Information Technology
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
HOST 2021   IEEE International Symposium on Hardware Oriented Security and Trust (HOST)