posted by user: stc12 || 5695 views || tracked by 12 users: [display]

ACM STC 2012 : The Seventh ACM Workshop on Scalable Trusted Computing

FacebookTwitterLinkedInGoogle


Conference Series : Scalable Trusted Computing
 
Link: http://www.cs.utsa.edu/~acmstc/stc2012/index.html
 
When Oct 15, 2012 - Oct 15, 2012
Where Raleigh, NC, USA
Submission Deadline Jul 16, 2012
Notification Due Aug 13, 2012
Final Version Due Aug 24, 2012
Categories    security   trust   system
 

Call For Papers

Built on the continuous success of ACM STC 2006-2011, this workshop focuses on fundamental technologies of trusted and high assurance computing and its applications in large-scale systems with varying degrees of trust. The workshop is intended to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues.

The workshop solicits two types of original papers: full papers and short/work-in-progress/position-papers. Submitted papers must be in ACM double-column format with at most 12 pages (full paper) and 6 pages (short paper), including bibliography, appendix etc. Note that reviewers are not required to read the appendix. A paper submitted to this workshop must not be in parallel submission to any other journal, magazine, conference or workshop with proceedings. It is up to the authors to decide whether a submission should be anonymous. Topics of interests include but not limited to:

security policies and models of trusted computing
architecture and implementation technologies for trusted platform
limitations, alternatives and tradeoffs regarding trusted computing
trusted computing in cloud and data center
cloud-based attestation services
trusted smartphone devices and systems
trust in smart grid, energy, and Internet of Things
trusted emerging and future Internet infrastructure
trusted online social network
trust in authentications, users and computing services
hardware based trusted computing
software based trusted computing
pros and cons of hardware based approach
remote attestation of trusted devices
censorship-freeness in trusted computing
cryptographic support in trusted computing
case study in trusted computing
principles for handling scales
scalable trust supports and services in cloud
trusted embedded computing and systems
virtualization and trusted computing

Related Resources

SA-TTA @SAC 2019   The 7th track on Software Architecture: Theory, Technology, and Applications (SA-TTA) at the 34rd ACM/SIGAPP Symposium On Applied Computing (SAC 2019)
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ICBDC--ACM, Ei and Scopus 2019   ACM--2019 4th International Conference on Big Data and Computing (ICBDC 2019)--Ei Compendex and Scopus
SECITC 2018   11th International Conference on Security for Information Technology and Communications
ACM--ICBDC--Ei and Scopus 2019   ACM--2019 4th International Conference on Big Data and Computing (ICBDC 2019)--Ei Compendex and Scopus
IJAB 2018   International Journal of Advances in Biology
ICDSP--ACM, EI, Scopus 2019   ACM--2019 3rd International Conference on Digital Signal Processing (ICDSP 2019)--Ei Compendex and Scopus
IJGTT 2018   International Journal of Game Theory and Technology
ACM--ICIAI--Ei Compendex and Scopus 2019   ACM--2019 The 3rd International Conference on Innovation in Artificial Intelligence (ICIAI 2019)--Ei Compendex and Scopus
CCGrid 2019   19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing