[Apologies if you receive multiple copies of this message]

----------------------------------------------------------------------

                           CALL FOR PAPERS

5th International Workshop on Security and Trust Management (STM 2009)
              Saint Malo, France -- September 24-25, 2009
                       http://stm09.dti.unimi.it

----------------------------------------------------------------------

STM (Security and Trust Management) is a established working group of
ERCIM (European Research Consortium in Informatics and Mathematics).
STM 2009 is the fifth workshop in this series and will be held in Saint
Malo, France, in conjunction with ESORICS 2009 (14th European Symposium
on Research in Computer Security). STM has the following aims:

- to investigate the foundations and applications of security and trust
  in ICT;
- to study the deep interplay between trust management and common
  security issues such as confidentiality, integrity, and availability;
- to identify and promote new areas of research connected with security
  management (e.g. dynamic and mobile coalition management, P2P, MANETs,
  Web/GRID services);
- to identify and promote new areas of research connected with trust
  management (e.g., reputation, recommendation, and collaboration);
- to provide a platform for presenting and discussing emerging ideas and
  trends.

Topics of interest include, but are not limited to:

- access control
- cryptography
- data protection
- digital right management
- economics of security and privacy
- key management
- ICT for securing digital as well as physical assets
- identity management
- networked systems security
- privacy and anonymity
- reputation systems and architectures
- security and trust management architectures
- semantics and computational models for security and trust
- trust assessment and negotiation
- trust in mobile code
- trust in pervasive environments
- trust models
- trust management policies
- trusted platforms and trustworthy systems
- trustworthy user devices

The primary focus is on high-quality original unpublished research, case
studies, and implementation experiences. We encourage submissions
discussing the application and deployment of security technologies in
practice.

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 12 pages in ENTCS
style format (using the generic template), including the bibliography
and well-marked appendices. Committee members are not required to read
the appendices, and so the paper should be intelligible without them.
Submissions are to be made to the submission web site (to be announced).
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits. Papers
must be received by the deadline of June 21, 2009. Authors of accepted
papers must guarantee that their papers will be presented at the
workshop. Accepted papers will be published in a post-workshop ENTCS volume.

GENERAL CHAIR
Christian Jensen
Technical University of Denmark, Denmark

PROGRAM CHAIRS
Sabrina De Capitani di Vimercati
Universita' degli Studi di Milano, Italy

Ralf Kusters
University of Trier, Germany

PUBLICATION CHAIR
Claudio A. Ardagna
Universita' degli Studi di Milano, Italy

PUBLICITY CHAIR
Eros Pedrini
Universita' degli Studi di Milano, Italy

IMPORTANT DATES
Paper Submission due: June 21, 2009
Notification to authors: July 27, 2009
Camera ready due: August 17, 2009

PROGRAM COMMITTEE
TBA


This call for papers and additional information about the conference
can be found at http://stm09.dti.unimi.it

_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to