posted by user: stm10 || 6981 views || tracked by 14 users: [display]

STM 2010 : 6th Workshop on Security and Trust Management


Conference Series : Security and Trust Management
When Sep 23, 2010 - Sep 24, 2010
Where Athens
Submission Deadline Jun 20, 2010
Notification Due Jun 20, 2010
Final Version Due Aug 18, 2010
Categories    security   trust management

Call For Papers

Program Co-Chairs
Jorge Cuellar, Siemens, Germany
Javier Lopez, University of Malaga, Spain
General Co-Chairs
Gilles Barthe, IMDEA Software, Spain
Alex Pretschner, Fraunhofer IESE, Germany
Local Organization Chair
Angeliki Tsochou, University of Piraeus, Greece
Publicity Chair
Carmen Fernandez-Gago, University of Malaga, Spain
Program Committee (Tentative)
Vijay Atluri, Rutgers University, USA
Levente Buttyan, BUTE, Hungary
Iliano Cervesato, Carnegie Mellon University, Qatar
Joris Claessens, Microsoft EMIC, Germany
Jim Clarke, WIT, Ireland
Cas Cremers, ETH Zurich, Switzerland
Anupam Datta, Carnegie Mellon University, USA
Sabrina de Capitani, Universita degli Studi diMilano, Italy
Theo Dimitrakos, BT, UK
Holger Dreger, Siemens, Germany
Simone Fischer-Huebner, Karlstad University, Sweden
Peter Herrmann, NTNU, Norway
Sushil Jajodia, George Mason University, USA
Martin Johns, SAP Research, Germany
Guenter Karjoth, IBM Research, Switzerland
Costas Lambrinoudakis, University of Aegean, Greece
Daniel Le Metayer, INRIA, France
Ninghui Li, Purdue University, USA
Peng Liu, Pennsylvania State University, USA
Volkmar Lotz, SAP Research, France
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxemburg, LU
Ron van der Meyden, University of New South Wales, Australia
Catherine Meadows, NRL, USA
Stig F. Mjolsnes, NTNU, Norway
Ricardo Neisse, Fraunhofer IESE, Germany
Cristina Nita-Rotaru, Purdue University, USA
Peter Ryan, University of Luxembourg, Luxembourg
Michael Rusinowitch, INRIA, France
Pierangela Samarati, Università degli Studi di Milano, Italy
Damien Sauveron, XLIM, University of Limoges, France
Jean-Marc Seigneur, University of Geneva, Switzerland
Ketil Stoelen, SINTEF, Norway
Ulrich Ultes-Nitsche, University of Fribourg, Switzerland
Luca Viganò, Università di Verona, Italy
Bogdan Warinschi, University of Bristol, UK
Will Winsborough, University of Texas at San Antonio, USA
Workshop scope
STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM’10 is the sixth workshop in this series and will be held in Athens, Greece in conjunction with EUROPKI'10 and CRITIS'10, and just after ESORICS'10.
Topics of interest include, but are not limited to:
- access control
- cryptography
- digital right management
- economics of security
- key management
- ICT for securing digital as well as physical assets
- identity management
- networked systems security
- privacy and anonymity
- reputation systems and architectures
- security and trust management architectures
- semantics and computational models for security
and trust
- trust assessment and negotiation
- trust in mobile code
- trust in pervasive environments
- trust models
- trust management policies
- trusted platforms and trustworthy systems
- trustworthy user devices
The primary focus is on high-quality original unpublished research, case studies, and implementation experiences. We encourage submissions discussing the application and deployment of security technologies in practice.
Instructions for paper submission
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submissions will be blind reviewed by at least three reviewers.
This year it is planned to have post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (under negotiation). All submissions should comply with the “Authors Instructions” that can be found at: and should not exceed 16 pages including references (Appendices are not included in the 16-page limit but, in case the paper is accepted for publication, they will be removed from the camera ready version).
The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords.

Submissions not meeting these guidelines risk rejection without consideration of their merits.
Papers must be submitted electronically in PDF format.

For paper submission please visit

Important dates
Submission of papers: June 20, 2010
Notification to authors: July 20, 2010
Camera-ready copies: August 18, 2010

Related Resources

IEEE ICIM 2023   IEEE--2023 the 9th International Conference on Information Management (ICIM 2023)
BIOS 2022   8th International Conference on Bioinformatics & Biosciences
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
IoT special issue 2022   Call for papers on the Special Issue titled Sustainability Privacy-Preserving of IoT-Based Application in Smart Healthcare
ACIE--EI 2023   2023 The 3rd Asia Conference on Information Engineering (ACIE 2023)
NLMLT 2022   International Conference on NLP and Machine Learning Trends
ICISSP 2023   9th International Conference on Information Systems Security and Privacy
IJANS 2022   International Journal on AdHoc Networking Systems
SIGMOD 2023   International Conference on Management of Data
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi