Call for poster
TRUST 2012 will feature a poster session that aims at rapid dissemination of latest research results. Authors are invited to submit a concise description of new research ideas and on-going projects to the Poster Track of TRUST 2012. The poster track is intended to provide a venue for research that is not mature enough to warrant a full paper but which would be of interest to the general community. We particularly encourage Ph.D. students to present their ongoing work.
We encourage submissions from all research areas relevant mentioned in the call for papers of TRUST, such as information security, trusted computing, trustworthy infrastructures and usability of security.
- Submission due: 04 May 2012
- Notification: 13 May 2012
- Conference: 13-15 June 2012
- Poster Session: 14 June 2012
Submissions should be no longer than 4 pages in LNCS format. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Posters must be written in English.
Authors of accepted posters will be expected to be present at their posters during the poster session of TRUST to discuss their work and answer questions.
To submit a poster please visit our Submission Site >>here<<
Call for paper
The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to:
- Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
- Trust, Security and Privacy in embedded systems
- Trust, Security and Privacy in social networks
- Trusted mobile platforms and mobile phone security
- Implementations of trusted computing (hardware and software)
- Applications of trusted computing
- Trustworthy infrastructures and services for cloud computing (including resilience)
- Attestation and integrity verification
- Cryptographic aspects of trusted and trustworthy computing
- Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs)
- Intrusion resilience in trusted computing
- Virtualization for trusted platforms
- Secure storage
- Security policy and management of trusted computing
- Access control for trusted platforms
- Privacy aspects of trusted computing
- Verification of trusted computing architectures
- Usability and end-user interactions with trusted platforms
- Limitations of trusted computing
- Usability and user perceptions of trustworthy systems and risks
- Effects of trustworthy systems upon user, corporate, and governmental behavior
- Economic drivers for trustworthy systems in corporate environment
- The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
- The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
- The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
- Game theoretical approaches to modeling or designing trustworthy systems
- Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
- Experimental economics studies of trustworthiness
- The interplay between privacy, privacy enhancing technologies and trustworthy systems
- Critiques of trustworthy systems
Submissions must be at most 18 pages in LNCS format. No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted. Papers must be written in English.
All submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.
To submit a paper please visit our Submission Site >>here<<.