posted by user: marwinK || 7518 views || tracked by 18 users: [display]

STC 2011 : The 6th ACM Workshop on Scalable Trusted Computing

FacebookTwitterLinkedInGoogle


Conference Series : Scalable Trusted Computing
 
Link: http://www.cs.utsa.edu/~acmstc/stc2011/
 
When Oct 17, 2011 - Oct 17, 2011
Where Chicago, IL, USA
Submission Deadline Jul 18, 2011
Notification Due Aug 7, 2011
Final Version Due Aug 25, 2011
Categories    trusted computing   security   scalability   trust
 

Call For Papers

Built on the continuous success of ACM STC 2006-2010, this workshop focuses on fundamental technologies of trusted and high assurance computing and its applications in large-scale systems with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues.

The workshop is co-located with ACM CCS and solicits two types of original papers that are single-column using at least 11pt fonts. The length of the full-paper submissions is at most 15 pages excluding bibliography, appendix etc. The total number of pages should not be more than 20, whereas the reviewers are not required to read the appendix. The length of short/work-in-progress/position-paper submissions is at most 8 pages excluding bibliography. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to:

* security policies and models of trusted computing
* architecture and implementation technologies for trusted platform
* limitations, alternatives and tradeoffs regarding trusted computing
* trusted computing in cloud and data center
* cloud-based attestation services
* trusted smartphone devices and systems
* trust in smart grid, energy, and Internet of Things
* trusted emerging and future Internet infrastructure
* trusted online social network
* trust in authentications, users and computing services
* hardware based trusted computing
* software based trusted computing
* pros and cons of hardware based approach
* remote attestation of trusted devices
* censorship-freeness in trusted computing
* cryptographic support in trusted computing
* case study in trusted computing
* principles for handling scales
* scalable trust supports and services in cloud
* trusted embedded computing and systems
* virtualization and trusted computing



General Chair:
Yan Chen, Northwestern University, USA

Workshop Organizational Chair:
Shouhuai Xu, University of Texas, San Antonio, USA

PC Co-chairs:
Ahmad-Reza Sadeghi, TU-Darmstadt, Germany
Xinwen Zhang, Huawei Research Center, USA

Publicity and Web Chair:
Marcel Winandy, Ruhr-University Bochum, Germany

Paper Submission:
https://www.easychair.org/conferences/?conf=stc2011

Related Resources

icist 2020   acm- 10th International Conference on Information Systems and Technologies
SP 2020   IEEE Symposium on Security and Privacy
ACM--BIOTC--Ei and Scopus 2020   ACM--2020 2nd Blockchain and Internet of Things Conference (BIOTC 2020)--Ei Compendex, Scopus
ICISSP 2020   6th International Conference on Information Systems Security and Privacy
CF 2020   ACM International Conference on Computing Frontiers 2020
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
ACM--ICISE--Ei Compendex & Scopus 2020   ACM--2020 the 5th International Conference on Information Systems Engineering (ICISE 2020)--Ei Compendex & Scopus
ICSS 2019   5th International Conference on Software Security