posted by user: somayen || 507 views || tracked by 4 users: [display]

TRUST 2016 : The 9th International Conference on Trust & Trustworthy Computing

FacebookTwitterLinkedInGoogle


Conference Series : Trust and Trustworthy Computing
 
Link: http://trust2016.sba-research.org/
 
When Aug 29, 2016 - Aug 30, 2016
Where Vienna, Austria
Submission Deadline May 9, 2016
Notification Due Jun 17, 2016
Final Version Due Jul 1, 2016
 

Call For Papers

TRUST, the international conference on Trust and Trustworthy Computing, is an stablished forum on trusted and trustworthy computing. TRUST, currently in its 9th instantiation, brings together researchers, practitioners, and decision makers interested in new ideas for designing, building, using and understanding trusted and trustworthy computing systems. TRUST invites submissions of original work on the design, operation, and effect of trusted and trustworthy computing in any relevant field.

Topics of interest include, but are not limited to:

-Architectures for trustworthy infrastructures
-Emerging applications and technologies, including recent industrial research and development on trusted/trustworthy computing
-Hardware security, including secure storage, cryptographic coprocessors, smartcards, and physically unclonable functions (PUFs)
-Trustworthy applications, including webbased systems
-Trusted mobile computing platforms
-Trustworthy embedded, CyberPhysical, and Internet of Things systems
-Security analysis and formal techniques for trusted/trustworthy computing
-Verification of trusted/trustworthy computing (architectures, platforms, software, protocols)
-Usability of trusted/trustworthy computing solutions and humancomputer interactions
-Cloud security and trustworthy services
-Trust management
-Software engineering techniques for trustworthiness
-Operating system security, including virtualization and monitoring
-Cryptography for trusted computing and related applications
-Intrusion detection and resilience leveraging trusted computing
-Security policies and management of trusted/trustworthy systems
-Experimental, userbased or testbed studies

Submission

We invite submissions of (i) full papers (up to 18 pages in LNCS format) and (ii) short papers (up to 9 pages in LNCS format).

Full papers are expected to report substantial and wellsubstantiated original results. Short papers can present work that is not fully fleshed out but brings forth novel and stimulating
ideas. Please submit short papers as such and please be aware that no full paper will be converted to a short paper as part of the review process.

All submissions must be carefully anonymized for double-blind reviewing. To submit a paper please visit our submission page.

Related Resources

PST 2016   14th International Conference on Privacy, Security and Trust
TrustCom 2016   The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
TrustSoft 2016   The 2nd IEEE International Workshop on Trustworthy Software Systems
TRUST 2016   The 9th International Conference on Trust & Trustworthy Computing
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
TRECK 2017   ACM SAC Trust Reputation TRECK Track 2017
IPM 2017   Special Issue: In (Big) Data we trust: Value Creation in Knowledge Organizations
INTERNET 2016   The Eighth International Conference on Evolving Internet
HOST 2017   CFP for the IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2017)
AsianHOST 2016   IEEE Asian Hardware-Oriented Security and Trust Symposium 2016