posted by organizer: rafael_accorsi || 8660 views || tracked by 10 users: [display]

STM 2013 : Security and Trust Management


Conference Series : Security and Trust Management
When Sep 9, 2013 - Sep 13, 2013
Where Egham, UK
Submission Deadline Jun 25, 2013
Notification Due Jul 16, 2013
Final Version Due Aug 12, 2013
Categories    security   trust   privacy

Call For Papers

!!!! N E W ____ D E A D L I N E S !!!!

9th International Workshop on Security and Trust Management (STM 2013)
in conjunction with ESORICS 2013
Egham, U.K. - September 09-13, 203

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2013 is the ninth workshop in this series and will be held in Egham,
U.K., in conjunction with the 18th European Symposium on Research in
Computer Security (ESORICS 2013). The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.

Confirmed keynote speakers
- Claire Vishik (Intel Corp., UK)
- Michael Huth (Imperial College, UK)

Topics of interest include, but are not limited to:

- Access control
- Anonymity
- Applied cryptography
- Authentication
- Complex systems security
- Data and application security
- Data protection
- Data/system integrity
- Digital right management
- Economics of security and privacy
- E-services
- Formal methods for security and trust
- Identity management
- Legal and ethical issues
- Networked systems security
- Operating systems security
- Privacy
- Security and trust metrics
- Security and trust policies
- Security and trust management architectures
- Security and trust in cloud environments
- Security and trust in grid computing
- Security and trust in pervasive computing
- Security and trust in social networks
- Social implications of security and trust
- Trust assessment and negotiation
- Trust in mobile code
- Trust models
- Trust management policies
- Trust and reputation systems
- Trusted platforms
- Trustworthy systems and user devices
- Web services security

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions should be at most 16
pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at (to be announced). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be registered and
received by the deadline. Authors of accepted papers must guarantee
that their papers will be presented at the workshop. Pre-proceedings
will be made available at the workshop. As for previous STM events,
it is planned to have post-proceedings published by Springer in the
Lecture Notes in Computer Science (LNCS) series.

Rafael Accorsi (University of Freiburg, Germany)
Silvio Ranise (Fundazione Bruno Kessler, Italy)

Giovanni Livraga (Universita' degli Studi di Milano, Italy)

PROGRAM COMMITTEE -- being assembled
Benjamin Aziz (University of Portsmouth, UK)
Mauro Conti (University of Padua, Italy)
Frédéric Cuppens (TELECOM Bretagne, France)
Nora Cuppens-Boulahia (TELECOM Bretagne, France)
Roberto Di Pietro (Università di Roma Tre, Italy)
Wenliang Du (Syracuse University, USA)
Isao Echizen (National Institute of Informatics, Japan)
Carmen Fernández-Gago (University of Malaga, Spain)
Sara Foresti (Universita` degli Studi di Milano, Italy)
Joaquin Garcia-Alfaro (Telecom SudParis, France)
Meiko Jensen (ULD Schleswig-Holstein, Germany)
Jan Jürjens (TU Dortmund & Fraunhofer ISST, Germany)
Florian Kerschbaum (SAP Research, Germany)
Felix Klaedtke (ETH Zurich, Switzerland)
Javier Lopez (University of Malaga, Spain)
Fabio Martinelli (IIT-CNR, Italy)
Raimundas Matulevicius (University of Tartu, Estonia)
Catherine Meadows (NRL, USA)
Charles Morisset (Newcastle University, UK)
Pierangela Samarati (Universita` degli Studi di Milano, Italy)
Mark Strembeck (Vienna University of Economics, Austria)
Mahesh Tripunitara (The University of Waterloo, Canada)
Michael Waidner (Fraunhofer SIT & TU Darmstadt, Germany)
Nicola Zannone (TU Eindhoven, Netherlands)

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
MobiWis 2022   The 18th International Conference on Mobile Web and Intelligent Information Systems
XAI_Bias_Trust@FLAIRS 2022   FLAIRS Special Track on Explainability, Bias, and Trust in Artificial Intelligence
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
SECRYPT 2022   19th International Conference on Security and Cryptography