posted by user: cdjensen || 5104 views || tracked by 6 users: [display]

IFIPTM 2015 : The 9th IFIP WG 11.11 International Conference on Trust Management

FacebookTwitterLinkedInGoogle


Conference Series : IFIP Trust Management
 
Link: http://s.ifiptm.org/conf2015
 
When May 26, 2015 - May 28, 2015
Where Hamburg, Germany
Submission Deadline Jan 5, 2015
Notification Due Feb 16, 2015
Final Version Due Mar 13, 2015
Categories    trust   trust management   reputation systems   security
 

Call For Papers

IFIPTM 2015 - Call for Papers

-------------------------------------------------------------------------------
The 9th IFIP WG 11.11 International Conference on Trust Management
Hamburg, 26-28 May 2015

http://s.ifiptm.org/conf2015
-------------------------------------------------------------------------------

IFIPTM 2015 invites submissions presenting novel research on all topics related to Trust, Security and Privacy, including but not limited to:

Trust in Information Technology
- formal aspects (specification, reasoning, and analysis)
- trust-based and trust-aware IT policy management
- trust social networks and emerging contexts
- trust in collaborative applications, crowd-sourcing and wiki systems
- trust in human-computer interaction and usable systems
- case studies and applications
Socio-Technical, economic and sociological Trust
- economic modeling of trust, risk and control; economics of trusted data quality
- trust, control and reputation effects in social networking, e- and m-commerce
- trust and socio materiality; socio-technical network structures; biological trust
- ethical, sociological, psychological, legal aspects
Trust and reputation management systems
- architectures and models
- metrics and computation
Identity management and trust
- anonymity, privacy and accountability
- identity and personal information brokering
- legal aspects
Secure, trustworthy and privacy-aware systems
- platforms and standards
- software and services
Trust building in Large scale systems
- trust in Cloud environments
- large Identity Management Systems like UID/SSN, Banks, Mobile user groups
- trust management for large user groups including machine and human participation


Paper Submission
IFIPTM 2015 welcomes submissions of both full and short papers on any topic related to the IFIPTM themes of trust, security and privacy and the topics mentioned above. Submitted full papers must not exceed 16 pages in length, including bibliography and well-marked appendices; short papers must not exceed 8 pages in length. Submission will be through the EasyChair conference management system. Papers must be submitted as a single PDF file, formatted using the LNCS format.
As previous editions, papers will be published by Springer under AICT series.

Submit at https://www.easychair.org/conferences/?conf=ifiptm2015.

The best papers will be invited for a special issue of the Journal of Trust Management.

Important Dates
Paper submission: January 5, 2015
Author notification: February 16, 2015
Camera-ready version: March 13, 2015
Conference dates: May 26-28, 2015

-------------------------------------------------------------------------------
Workshop and Tutorial
IFIPTM 2015 invites proposals for the Workshop and Tutorial Programs.
-------------------------------------------------------------------------------

Workshops should stimulate and facilitate an atmosphere of active and constructive exchange on current issues of interest. They should allow members of the community to compare and discuss approaches, methods, and concepts about specific topics addressed by the conference. Workshops may address new emerging areas of interest for Trust Management that in the future may become core, focus on industrial experience with methods and technologies related to Trust Management or address peripheral issues of interest to the Trust Management research community.

Tutorials should allow members of the community to interactively gain specialist knowledge or skills, discover new paradigms, solutions or research investigations through motivating examples, compare existing approaches and concepts, and possibly explain how these can be put into current of future practice. In practice, tutorials should serve one or more of the following objectives:
-Survey, explain and discuss: research works and projects, industrial products and markets or governmental frameworks and policies
-Provide instruction in established but specialised Trust Management methodologies
-Present a novel synthesis combining distinct lines of work in Trust Management
Tutorials should cover a varied range of issues and not be used to promote a single research approach or a product

Important Dates
Workshop Proposal Submission: January 29, 2015
Accept Notification: February 12, 2015
Tutorial Proposal Submission: February 27, 2015
Accept Notification: March 12, 2015

Submission of workshop and tutorial proposals should be made by sending an email to ifiptm-workshops@compute.dtu.dk.

-------------------------------------------------------------------------------
Poster and Demonstration
IFIPTM 2015 welcomes submissions of Demonstrations of tools and submissions of Posters that focus on any relevant topic under the theme Trust, Security and Privacy.
-------------------------------------------------------------------------------

Demonstrations should exhibit new research results and projects, industrial products, explore new business models, or illustrate new governmental frameworks and policies. They should allow members of the community to interactively discover and explore new paradigms or solutions through motivated examples.

Posters can present any relevant study, idea or project and can include student projects (Bachelor, Master's or PhD).

Proposals for demonstrations or posters must be one page, written in English and formatted using the LNCS format.
Important Dates
Proposal Submission: February 27, 2015
Author Notification: March 12, 2015

Submission of poster proposals should be made by sending an email to ifiptm-posters@compute.dtu.dk.

-------------------------------------------------------------------------------
Panel / Special Session
-------------------------------------------------------------------------------

IFIPTM 2015 welcomes submissions of panels or special sessions that focus on any relevant topic under the theme Trust, Security and Privacy.

Proposals for panels and special sessions should be no more than two pages in length. Panel proposals should include a description of the topic addressed by the panel, the name of the panel moderator, and a prospective list of panel members. Proposals for special sessions should indicate the scope of the session and the name of the session chair.

Important Dates
Proposal Submission: February 27, 2015
Author Notification: March 12, 2015

Submission of poster proposals should be made by sending an email to ifiptm-panel@compute.dtu.dk.

-------------------------------------------------------------------------------
Graduate Symposium
-------------------------------------------------------------------------------

Master’s and PhD students are invited to submit extended abstracts of their thesis work for presentation and discussion at the Trust Management Graduate Student Symposium 2015. The TM Graduate Student Symposium provides an opportunity for students to discuss and explore their research interests and career objectives with their peers and with a panel of established researchers in Trust Management.


Students whose abstracts are accepted are invited to give a presentation on their work before a group of peers and senior researchers in Trust Management, who will provide constructive critique, advice, and mentoring. The presented work may also be presented in the IFIPTM 2015 poster session, and a special conference session is planned for selected students to present their work in the main IFIPTM conference.

Important Dates
Abstract submission due: February 13, 2015
Notification of acceptance: February 27, 2015
Revised abstract due: March 12, 2015

Submission for the graduate symposium should be made by sending an email to ifiptm-graduate@compute.dtu.dk.

-------------------------------------------------------------------------------
Organisation

General Chairs
Yuko Murayama, Iwate Prefecture University, Japan
Theo Dimitrakos, BT Research & Technology and University of Kent, UK

Program Chairs
Christian D. Jensen, Technical University of Denmark, Denmark
Stephen Marsh, University of Ontario Institute of Technology, Canada

Workshop and Tutorial Chairs
Sheikh Habib, TU Darmstadt, Germany
Jan-Philip Steghöfer, Göteborg University, Sweden

Poster and Demonstration Chairs
Dhiren Patel, NIT Surat, India
Audun Jøsang, University of Oslo, Norway

Panel / Special Session Chairs
Jean-Marc Seigneur, University of Geneva, Switzerland
Masakatsu Nishigaki, Shizuoka University, Japan

Graduate Symposium Chairs
Nurit GalOz, Ben Gurion University of the Negev, Israel
Jie Zhang, Nanyang Technological University, singapore

Publicity Chairs
Tim Muller, Nanyang Technological University, singapore
Anirban Basu, KDDI R&D Laboratories, Japan

Local Organization Chairs
Dominik Herrmann, Universität Hamburg, Germany


-------------------------------------------------------------------------------
Program Committee (To be confirmed)

Rehab Alnemr, HP Labs Bristol, UK
Man Ho Au, University of Wollongong, Australia
Anirban Basu, KDDI R&D Laboratories, Japan
Elisa Bertino, Purdue University, USA
David Chadwick, University of Kent, UK
Frederic Cuppens, Telecom Bretagne, France
Theo Dimitrakos, BT Research & Technology and University of Kent, UK
Rino Falcone, Institute of Cognitive Sciences and Technologies, Italy
Carmen Fernández-Gago, University of Malaga, Spain
Josep Ferrer, University of the Balearic Islands, Spain
Simone Fischer-Huebner, Karlstad University, Sweden
Sara Foresti, The University of Milan, Italy
Nurit Gal-Oz, Sapir Academic College, Israel
Dieter Gollmann, Hamburg University of Technology, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Ehud Gudes, Ben Gurion University, Israel
Omar Hasan, INSA Lyon, France
Peter Herrmann, Norwegian University of Science and Technology, Norway
Xinyi Huang, Deakin University, Australia
Roslan Ismail, Tenaga National University, Malaysia
Christian Damsgaard Jensen, Technical University of Denmark, Denmark
Audun Josang, University of Oslo, Norway
Yuecel Karabulut. VMware, USA
Costas Lambrinoudakis, University of Piraeus, Greece
Gabriele Lenzini, University of Luxembourg, Luxembourg
Joseph Liu, Institute for Infocomm Research, Singapore
Javier Lopez, University of Malaga, Spain
Steve Marsh, University of Ontario Institute of Technology, Canada
Fabio Martinelli, IIT-CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Weizhi Meng, City University of Hong Kong, Hong Kong
Yuko Murayama, Iwate Prefectural University, Japan
Wee Keong Ng, Nanyang Technological University, Singapore
Masakatsu Nishigaki, Shizuoka University, Japan
Dhiren Patel, Sardar Vallabhbhai National Institute of Technology, India
Gunther Pernul, University of Regensburg, Germany
Sini Ruohomaa, University of Helsinki, Finland
Pierangela Samarati, University of Milan, Italy
Ketil Stolen, SINTEF, Norway
Mahesh Tripunitara, The University of Waterloo, Canada
Claire Vishik, Intel Corporation, UK
Ian Wakeman, University of Sussex, UK
Shouhuai Xu, University of Texas at San Antonio, USA
Jie Zhang, Nanyang Technological University, Singapore
Jianying Zhou, Institute for Infocomm Research, Singapore

Related Resources

IFIPTM 2017   11th IFIP WG 11.11 International Conference on Trust Management, Göteborg, June 12-16, 2017
RAID 2017   20th International Symposium on Research in Attacks, Intrusions and Defenses
DBSec 2017   31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance
CRiSIS 2017   12th International Conference on Risks and Security of Internet and Systems
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
IFIP WG 9.4 2017   The 14th International Conference on Social Implications of Computers in Developing Countries
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
EuropeanSeC 2017   2017 European Security Conference