Call for Paper TRUST 2012
13 - 15 June 2012
Vienna, Austria
http://www.trust.sba-research.org

TRUST 2012 is an international conference on the technical and soci-economic 
aspects of trustworthy infrastructures. It provides an excellent 
interdisciplinary forum for researchers, practitioners, and decision makers to 
explore new ideas and discuss experiences in building, designing, using and 
understanding trustworthy computing systems.
Building on the success of TRUST 2011 (held in Pittsburgh, USA) and TRUST 2010 
(held in Berlin, Germany) TRUST 2009 (held in Oxford, UK), this conference 
focuses on trusted and trustworthy computing, both from the technical and 
social perspectives. The conference itself has two main strands, one devoted to 
technical aspects and one devoted to the socio-economic aspects of trusted 
computing.

Important dates:
Submission due: 22 February 2012, 23:59 UTC
Notification: 25 March 2012
Camera ready: 09 April 2012
Conference: 13-15 June 2012

The conference solicits original papers on any aspect (technical or social and 
economic) of the design, application and usage of trusted and trustworthy 
computing, which concerns a broad range of concepts including trustworthy 
infrastructures, cloud computing, services, hardware, software and protocols. 
Topics of interest include, but are not limited to:
Technical Strand:
Architecture and implementation technologies for trusted platforms and 
trustworthy infrastructures
Trust, Security and Privacy in embedded systems
Trust, Security and Privacy in social networks
Trusted mobile platforms and mobile phone security
Implementations of trusted computing (hardware and software)
Applications of trusted computing
Trustworthy infrastructures and services for cloud computing (including 
resilience)
Attestation and integrity verification
Cryptographic aspects of trusted and trustworthy computing
Design, implementation and analysis of security hardware, i.e., hardware with 
cryptographic and security functions, physically unclonable functions (PUFs)
Intrusion resilience in trusted computing
Virtualization for trusted platforms
Secure storage
Security policy and management of trusted computing
Access control for trusted platforms
Privacy aspects of trusted computing
Verification of trusted computing architectures
Usability and end-user interactions with trusted platforms
Limitations of trusted computing
Socio-economic Strand:
Usability and user perceptions of trustworthy systems and risks
Effects of trustworthy systems upon user, corporate, and governmental behavior
Economic drivers for trustworthy systems in corporate environment
The impact of trustworthy systems in enhancing trust in cloud-like 
infrastructures
The adequacy of guarantees provided by trustworthy systems for systems 
critically dependent upon trust, such as elections and government oversight
The impact of trustworthy systems upon digital forensics, police investigations 
and court proceedings
Game theoretical approaches to modeling or designing trustworthy systems
Approaches to model and simulate scenarios of how trustworthy systems would be 
used in corporate environments and in personal space
Experimental economics studies of trustworthiness
The interplay between privacy, privacy enhancing technologies and trustworthy 
systems
Critiques of trustworthy systems

Best regards
Yvonne Poul
Organisation TRUST 2012


_______________________________________________
MEXT mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/mext

Reply via email to