posted by user: mpirker || 5113 views || tracked by 11 users: [display]

InTrust 2013 : 5th International Conference on Trusted Systems

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Trusted Systems
 
Link: http://intrust13.iaik.tugraz.at/
 
When Dec 5, 2013 - Dec 6, 2013
Where Graz, Austria
Submission Deadline Jul 29, 2013
Notification Due Aug 26, 2013
Final Version Due Sep 16, 2013
Categories    trust   security   mobile
 

Call For Papers

Call for Papers

InTrust 2013: 5th International Conference on Trusted Systems
5-6th December 2013, Graz, Austria
http://intrust13.iaik.tugraz.at/

The InTrust conference focuses on the theory, technologies and
applications of trusted systems. It is devoted to all aspects of
trusted computing systems, including trusted modules, platforms,
networks, services and applications, from their fundamental features
and functionalities to design principles, architecture and
implementation technologies. The goal of the conference is to bring
academic and industrial researchers, designers, and implementers
together with end-users of trusted systems, in order to foster the
exchange of ideas in this challenging and fruitful area.

InTrust 2013 will take place on 5th and 6th December 2013. The
conference will be hosted by the Institute for Applied Information
Processing and Communications (IAIK) of Graz University of
Technology (TUG). InTrust 2013 solicits original papers on any
aspect of the theory, advanced development and applications of
trusted computing, trustworthy systems and general trust issues in
modern computing systems.

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or have submitted in parallel to
any journal or other conference or workshop that has proceedings.
All submissions will be blind-reviewed. Papers must be anonymous,
with no author names, affiliations, acknowledgements, or obvious
references. A submitted paper should begin with a title, a short
abstract, and a list of keywords.

The proceedings of InTrust 2013 will be published in the Springer-
Verlag Lecture Notes in Computer Science series. Papers published in
the LNCS series are indexed by both EI and ISTP. Clear instructions
for the preparation of a final proceedings version will be sent to
the authors of accepted papers. Papers should be submitted in
standard LNCS format, with length at most 15 pages (excluding
bibliography and appendices). Committee members are not required to
review more pages than this, so papers should be intelligible within
this length. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Authors of accepted papers
must guarantee that their paper will be presented at the conference.
Papers must be submitted in PDF format using the EasyChair
conference management system at
https://www.easychair.org/account/signin.cgi?conf=intrust13

Please send any enquiries to: intrust13@iaik.tugraz.at

The conference has a best paper award to the value of US$1,000,
sponsored by Beijing Institute of Technology; all papers are
eligible for this award.

Topics of relevance include but are not limited to:
* Fundamental features and functionalities of trusted systems
* Primitives and mechanisms for building a chain of trust
* Design principles and architectures for trusted modules and
platforms
* Trustworthy infrastructures and cloud computing services
* Implementation technologies for trusted modules and platforms
* Cryptographic aspects of trusted systems, including cryptographic
algorithms and protocols, and their implementation and application
in trusted systems
* Secure network operation
* Mobile trusted systems
* Applications of trusted systems
* Trusted intellectual property protection: metering, watermarking,
digital rights management and enterprise rights management
* Software & hardware protection for trusted systems
* Authentication and access control for trusted systems
* Identity & privacy aspects of trusted systems
* Attestation for trusted systems, including measurement and
verification of the behavior of trusted systems
* Emerging technologies and standards for trusted systems
* Trust metrics and robust trust inference in distributed systems
* Usability and reliability aspects of trusted systems
* Trust modeling, economic analysis and protocol design for rational
and malicious adversaries
* Virtualization for trusted systems
* Limitations of trusted systems
* Security analysis of trusted systems, including formal methods
proofs, provable security and automated analysis
* Security policies for, and management of, trusted systems
* Intrusion resilience and revocation aspects of trusted systems
* Scalability aspects of trusted systems
* Compatibility aspects of trusted systems
* Experiences in building real-world trusted systems
* Socio-economic aspects of trusted systems

Key dates
EXTENDED Deadline for submissions: Monday, 29 July 2013(!)
Notifications to authors: Monday, 26 August 2013
Camera ready due: Monday, 16 September 2013
Opening of conference: Thursday, 5 December 2013

Program Committee Chairs
Roderick Bloem, Graz University of Technology, Austria
Peter Lipp, Graz University of Technology, Austria

Program Committee
Liqun Chen, HP Laboratories, UK
Zhong Chen, Peking University, China
Xuhua Ding, SMU, Singapore
Loic Duflot, SGDN, France
Dieter Gollmann, TU Hamburg-Harburg, Germany
Sigrid Guergens, Fraunhofer SIT, Germany
Stefan Katzenbeisser, TU Darmstadt, Germany
Dirk Kuhlmann, HP Laboratories, UK
Xuejia Lai, Shanghai Jiao Tong University, China
Mario Lamberger, NXP, Austria
Jiangtao Li, Intel, USA
Javier Lopez, University of Malaga, Spain
Stefan Mangard, Infineon, Germany
Andrew Martin, University of Oxford, UK
Shin'Ichiro Matsuo, NICT, Japan
Chris Mitchell, RHUL, UK
Yi Mu, University of Wollongong, Australia
Martin Pirker, Graz University of Technology, Austria
Graeme Proudler, HP Laboratories, UK
Scott Rotondo, Oracle, USA
Mark Ryan, University of Birmingham, UK
Willy Susilo, University of Wollongong, Australia
Ronald Toegl, Graz University of Technology, Austria
Claire Vishik, Intel, UK
Jian Weng, Jinan University, China
Marcel Winandy, Ruhr-University Bochum, Germany
Xinwen Zhang, Huawei Research Center, USA
Yongbin Zhou, Chinese Academy of Sciences, China
Liehuang Zhu, Beijing Institute of Technology, China
Yan Zhu, Peking University, China

Steering Committee
Yongfei Han, BJUT & ONETS, China
Moti Yung, Google & Columbia University, USA
Liqun Chen, HP Laboratories, UK
Robert Deng, SMU, Singapore
Chris Mitchell, RHUL, UK

Local Organizers
Martina Piewald
Martin Pirker
Ronald Toegl

Sponsors
Beijing Institute of Technology

Related Resources

Social Information Systems @ HICSS-51   Social Information Systems Minitrack - Hawaii International Conference on System Sciences (HICSS-51)
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
OSDI 2018   13th USENIX Symposium on Operating Systems Design and Implementation
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
ICANN 2018   27th International Conference on Artificial Neural Networks
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems
AI 2017   3rd International Conference on Artificial Intelligence and Applications
ICISIP 2018   The 6th IIAE International Conference on Intelligent Systems and Image Processing 2018
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities