posted by organizer: mstamat || 7673 views || tracked by 19 users: [display]

TRUST 2014 : 7th International Conference on Trust & Trustworthy Computing


Conference Series : Trust and Trustworthy Computing
When Jun 30, 2014 - Jul 2, 2014
Where Hersonissos, Crete, Greece
Submission Deadline Mar 14, 2014
Notification Due Apr 14, 2014
Final Version Due Apr 21, 2014
Categories    trusted computing   trust   security   privacy

Call For Papers

Call for Papers: TRUST 2014
7th International Conference on Trust & Trustworthy Computing
June 30 - July 2, 2014 - Hersonissos, Crete, Greece
====================================================================== /

TRUST 2014 is an international conference on the technical and
socio-economic aspects of trustworthy infrastructures. It provides
an excellent interdisciplinary forum for researchers, practitioners,
and decision makers to explore new ideas and discuss experiences in
building, designing, using and understanding trustworthy computing

TRUST 2014 will be held from June 30 to July 2 2014 in Hersonissos,
Crete, Greece. Hersonissos is a popular holiday resort located 30km
from Heraklion, the island's largest city.

Important Dates
* Paper submission (extended): March 14, 2014
* Acceptance notification (extended): April 14, 2014
* Final paper due: April 21, 2014
* Conference: June 30 - July 2, 2014

Topics of Interest
TRUST 2014 solicits original contributions on any aspect of the
design, application and usage of trusted and trustworthy computing.
Topics of interest include (but are not limited to):

* Architecture and implementation technologies for trusted
platforms and trustworthy infrastructures
* Trust, Security and Privacy in embedded systems
* Trust, Security and Privacy in social networks
* Trusted mobile platforms and mobile phone security
* Implementations of trusted computing (hardware and software)
* Applications of trusted computing
* Trustworthy infrastructures and services for cloud computing
(including resilience)
* Attestation and integrity verification
* Cryptographic aspects of trusted and trustworthy computing
* Design, implementation and analysis of security hardware
* Security hardware with cryptographic and security functions,
physically unclonable functions (PUFs)
* Intrusion resilience in trusted computing
* Virtualization for trusted platforms
* Secure storage
* Security policy and management of trusted computing
* Access control for trusted platforms
* Privacy aspects of trusted computing
* Verification of trusted computing architectures
* Usability and end-user interactions with trusted platforms
* Limitations of trusted computing
* Role of trust in human-computer interactions
* Usability and user perceptions of trustworthy systems and risks
* Patterns of trust practices in human-computer interactions
* Effects of trustworthy systems upon user, corporate, and
governmental behavior
* Impact of trustworthy systems in enhancing trust in cloud-like
* Adequacy of guarantees provided by trustworthy systems for
systems critically dependent upon trust, such as elections and
government oversight
* Impact of trustworthy systems upon digital forensics, police
investigations and court proceedings
* Game theoretical approaches to modelling or designing trustworthy
* Approaches to model and simulate scenarios of how trustworthy
systems would be used in corporate environments and in personal
* Economic drivers for trustworthy systems in corporate
* Experimental economics studies of trustworthiness
* Interplay between privacy, privacy enhancing technologies and
trustworthy systems
* Evaluation of research methods used in the research of
trustworthy and trusted computing
* Critiques of trustworthy systems
* Metrics of trust
* Privacy Aspects of Trust Computing
* Engineering Processes for Trustworthy Computing

Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal,
conference or workshop. Simultaneous submission of the same work
is not allowed. Authors of accepted papers must guarantee that their
papers will be presented at the conference.

Format of paper submissions
Two formats of submissions are solicited:
* Full papers (up to 18 pages) that report on in-depth, mature
research results.
* Short papers (up to 9 pages) that describe brief results or
exciting work-in-progress.

To submit your work, visit:

All paper submissions to TRUST 2014 must be in LNCS format and written
in English. The templates for LNCS format can be downloaded from:

All submissions must be within the page limits mentioned above.
No changes to margins, spacing, or font sizes (or anything else)
are allowed. The program committee reserves the right to request
the source files for a submission to verify compliance with this

Moreover, all submissions must be anonymized. An author's name should
occur only in references to that author's related work, which should
be referenced in the third person and not be overtly distinguishable
from the referenced work of others.

Only PDF files will be accepted.

Poster submissions
TRUST 2014 encourages the presentation of posters that aim at the
rapid dissemination of new ideas, work in progress or preliminary
results. We particularly encourage PhD students to present their
ongoing work.

For details on poster submissions check our website:

Organisation Committee
* General Chair: Ioannis Askoxylakis, FORTH, GR
* Program Chairs:
- Sotiris Ioannidis, FORTH, GR
- Thorsten Holz, Ruhr University Bochum, DE

For the full Program Committee see:

TRUST 2014 Twitter Updates
Announcements regarding TRUST 2014 will be sent through @syssecproject
on Twitter:

Related Resources

ICISSP 2020   6th International Conference on Information Systems Security and Privacy
SP 2020   IEEE Symposium on Security and Privacy
IEEE Mobile Cloud 2019   The Seventh IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
WiCom-5G-SEC 2019   IEEE Wireless Communications Special Issue on Challenges and Novel Solutions for 5G Network Security, Privacy and Trust
SeTM 2019   Security and Trust in Mobile Network 2019
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
PST 2019   17th Annual International Conference on Privacy, Security, and Trust (PST2019)
ICSS 2019   5th International Conference on Software Security
TrustCom 2019   The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications