posted by user: marwinK || 7069 views || tracked by 18 users: [display]

STC 2011 : The 6th ACM Workshop on Scalable Trusted Computing

FacebookTwitterLinkedInGoogle


Conference Series : Scalable Trusted Computing
 
Link: http://www.cs.utsa.edu/~acmstc/stc2011/
 
When Oct 17, 2011 - Oct 17, 2011
Where Chicago, IL, USA
Submission Deadline Jul 18, 2011
Notification Due Aug 7, 2011
Final Version Due Aug 25, 2011
Categories    trusted computing   security   scalability   trust
 

Call For Papers

Built on the continuous success of ACM STC 2006-2010, this workshop focuses on fundamental technologies of trusted and high assurance computing and its applications in large-scale systems with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues.

The workshop is co-located with ACM CCS and solicits two types of original papers that are single-column using at least 11pt fonts. The length of the full-paper submissions is at most 15 pages excluding bibliography, appendix etc. The total number of pages should not be more than 20, whereas the reviewers are not required to read the appendix. The length of short/work-in-progress/position-paper submissions is at most 8 pages excluding bibliography. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to:

* security policies and models of trusted computing
* architecture and implementation technologies for trusted platform
* limitations, alternatives and tradeoffs regarding trusted computing
* trusted computing in cloud and data center
* cloud-based attestation services
* trusted smartphone devices and systems
* trust in smart grid, energy, and Internet of Things
* trusted emerging and future Internet infrastructure
* trusted online social network
* trust in authentications, users and computing services
* hardware based trusted computing
* software based trusted computing
* pros and cons of hardware based approach
* remote attestation of trusted devices
* censorship-freeness in trusted computing
* cryptographic support in trusted computing
* case study in trusted computing
* principles for handling scales
* scalable trust supports and services in cloud
* trusted embedded computing and systems
* virtualization and trusted computing



General Chair:
Yan Chen, Northwestern University, USA

Workshop Organizational Chair:
Shouhuai Xu, University of Texas, San Antonio, USA

PC Co-chairs:
Ahmad-Reza Sadeghi, TU-Darmstadt, Germany
Xinwen Zhang, Huawei Research Center, USA

Publicity and Web Chair:
Marcel Winandy, Ruhr-University Bochum, Germany

Paper Submission:
https://www.easychair.org/conferences/?conf=stc2011

Related Resources

SIGIR 2019   International ACM SIGIR Conference on Research and Development in Information Retrieval
DSN 2019   Dependable Systems and Networks
KDD 2019   25TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING
IEEE S&P 2019   IEEE Symposium on Security and Privacy
KLP@SAC 2019   Knowledge and Language Processing Track @ The 34th ACM Symposium on Applied Computing - ACM SAC 2019
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
SA-TTA @SAC 2019   The 7th track on Software Architecture: Theory, Technology, and Applications (SA-TTA) at the 34rd ACM/SIGAPP Symposium On Applied Computing (SAC 2019)
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
KomIS@ACM-SAC 2019   ACM SAC 2019 - KomIS track: Application of AI and Big Data Analytics
SIGMETRICS 2019   ACM SIGMETRICS / IFIP PERFORMANCE 2019