posted by organizer: rafael_accorsi || 6976 views || tracked by 10 users: [display]

STM 2013 : Security and Trust Management

FacebookTwitterLinkedInGoogle


Conference Series : Security and Trust Management
 
Link: http://bit.ly/ERCIM-STM13
 
When Sep 9, 2013 - Sep 13, 2013
Where Egham, UK
Submission Deadline Jun 25, 2013
Notification Due Jul 16, 2013
Final Version Due Aug 12, 2013
Categories    security   trust   privacy
 

Call For Papers

!!!! N E W ____ D E A D L I N E S !!!!

CALL FOR PAPERS
9th International Workshop on Security and Trust Management (STM 2013)
in conjunction with ESORICS 2013
Egham, U.K. - September 09-13, 203

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2013 is the ninth workshop in this series and will be held in Egham,
U.K., in conjunction with the 18th European Symposium on Research in
Computer Security (ESORICS 2013). The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.

Confirmed keynote speakers
- Claire Vishik (Intel Corp., UK)
- Michael Huth (Imperial College, UK)


Topics of interest include, but are not limited to:

- Access control
- Anonymity
- Applied cryptography
- Authentication
- Complex systems security
- Data and application security
- Data protection
- Data/system integrity
- Digital right management
- Economics of security and privacy
- E-services
- Formal methods for security and trust
- Identity management
- Legal and ethical issues
- Networked systems security
- Operating systems security
- Privacy
- Security and trust metrics
- Security and trust policies
- Security and trust management architectures
- Security and trust in cloud environments
- Security and trust in grid computing
- Security and trust in pervasive computing
- Security and trust in social networks
- Social implications of security and trust
- Trust assessment and negotiation
- Trust in mobile code
- Trust models
- Trust management policies
- Trust and reputation systems
- Trusted platforms
- Trustworthy systems and user devices
- Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions should be at most 16
pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at (to be announced). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be registered and
received by the deadline. Authors of accepted papers must guarantee
that their papers will be presented at the workshop. Pre-proceedings
will be made available at the workshop. As for previous STM events,
it is planned to have post-proceedings published by Springer in the
Lecture Notes in Computer Science (LNCS) series.

PROGRAM CHAIRS
Rafael Accorsi (University of Freiburg, Germany)
Silvio Ranise (Fundazione Bruno Kessler, Italy)

PUBLICITY CHAIR
Giovanni Livraga (Universita' degli Studi di Milano, Italy)

PROGRAM COMMITTEE -- being assembled
Benjamin Aziz (University of Portsmouth, UK)
Mauro Conti (University of Padua, Italy)
Frédéric Cuppens (TELECOM Bretagne, France)
Nora Cuppens-Boulahia (TELECOM Bretagne, France)
Roberto Di Pietro (Università di Roma Tre, Italy)
Wenliang Du (Syracuse University, USA)
Isao Echizen (National Institute of Informatics, Japan)
Carmen Fernández-Gago (University of Malaga, Spain)
Sara Foresti (Universita` degli Studi di Milano, Italy)
Joaquin Garcia-Alfaro (Telecom SudParis, France)
Meiko Jensen (ULD Schleswig-Holstein, Germany)
Jan Jürjens (TU Dortmund & Fraunhofer ISST, Germany)
Florian Kerschbaum (SAP Research, Germany)
Felix Klaedtke (ETH Zurich, Switzerland)
Javier Lopez (University of Malaga, Spain)
Fabio Martinelli (IIT-CNR, Italy)
Raimundas Matulevicius (University of Tartu, Estonia)
Catherine Meadows (NRL, USA)
Charles Morisset (Newcastle University, UK)
Pierangela Samarati (Universita` degli Studi di Milano, Italy)
Mark Strembeck (Vienna University of Economics, Austria)
Mahesh Tripunitara (The University of Waterloo, Canada)
Michael Waidner (Fraunhofer SIT & TU Darmstadt, Germany)
Nicola Zannone (TU Eindhoven, Netherlands)

Related Resources

STM 2018   14th International Workshop on Security and Trust Management
NECO 2018   7th International Conference of Networks and Communications
SeTM 2019   Security and Trust in Mobile Network 2019
IEEE S&P 2019   IEEE Symposium on Security and Privacy
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
ACNS 2019   International Conference on Applied Cryptography and Network Security
DSN 2019   Dependable Systems and Networks
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11