Difference between revisions of "TRUST 2012"

From Openresearch
Jump to: navigation, search
(New page: {{Event |Acronym=TRUST 2012 |Title=5th International Conference on Trust and Trustworthy Computing |Series=TRUST |Type=Conference |Field=Trustworthy Computing |Start date=2012/06/13 |End d...)
 
 
Line 28: Line 28:
 
   
 
   
 
Technical Strand:
 
Technical Strand:
 +
 
Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
 
Architecture and implementation technologies for trusted platforms and trustworthy infrastructures
 +
 
Trust, Security and Privacy in embedded systems
 
Trust, Security and Privacy in embedded systems
 +
 
Trust, Security and Privacy in social networks
 
Trust, Security and Privacy in social networks
 +
 
Trusted mobile platforms and mobile phone security
 
Trusted mobile platforms and mobile phone security
 +
 
Implementations of trusted computing (hardware and software)
 
Implementations of trusted computing (hardware and software)
 +
 
Applications of trusted computing
 
Applications of trusted computing
 +
 
Trustworthy infrastructures and services for cloud computing (including resilience)
 
Trustworthy infrastructures and services for cloud computing (including resilience)
 +
 
Attestation and integrity verification
 
Attestation and integrity verification
 +
 
Cryptographic aspects of trusted and trustworthy computing
 
Cryptographic aspects of trusted and trustworthy computing
 +
 
Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs)  
 
Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs)  
 +
 
Intrusion resilience in trusted computing
 
Intrusion resilience in trusted computing
 +
 
Virtualization for trusted platforms
 
Virtualization for trusted platforms
 +
 
Secure storage
 
Secure storage
 +
 
Security policy and management of trusted computing
 
Security policy and management of trusted computing
 +
 
Access control for trusted platforms
 
Access control for trusted platforms
 +
 
Privacy aspects of trusted computing
 
Privacy aspects of trusted computing
 +
 
Verification of trusted computing architectures
 
Verification of trusted computing architectures
 +
 
Usability and end-user interactions with trusted platforms
 
Usability and end-user interactions with trusted platforms
 +
 
Limitations of trusted computing
 
Limitations of trusted computing
 
   
 
   
 +
 
Socio-economic Strand:
 
Socio-economic Strand:
 +
 
Usability and user perceptions of trustworthy systems and risks
 
Usability and user perceptions of trustworthy systems and risks
 +
 
Effects of trustworthy systems upon user, corporate, and governmental behavior
 
Effects of trustworthy systems upon user, corporate, and governmental behavior
 +
 
Economic drivers for trustworthy systems in corporate environment
 
Economic drivers for trustworthy systems in corporate environment
 +
 
The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
 
The impact of trustworthy systems in enhancing trust in cloud-like infrastructures
 +
 
The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
 
The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight
 +
 
The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
 
The impact of trustworthy systems upon digital forensics, police investigations and court proceedings
 +
 
Game theoretical approaches to modeling or designing trustworthy systems
 
Game theoretical approaches to modeling or designing trustworthy systems
 +
 
Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
 
Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space
 +
 
Experimental economics studies of trustworthiness
 
Experimental economics studies of trustworthiness
 +
 
The interplay between privacy, privacy enhancing technologies and trustworthy systems
 
The interplay between privacy, privacy enhancing technologies and trustworthy systems
 +
 
Critiques of trustworthy systems
 
Critiques of trustworthy systems

Latest revision as of 11:27, 30 November 2011

TRUST 2012
5th International Conference on Trust and Trustworthy Computing
Event in series TRUST
Dates 2012/06/13 (iCal) - 2012/06/15
Homepage: www.trust.sba-research.org/
Location
Location: Vienna, Austria
Loading map...

Important dates
Papers: 2012/02/22
Submissions: 2012/02/22
Notification: 2012/03/25
Camera ready due: 2012/04/09
Table of Contents


TRUST 2012 is an international conference on the technical and soci-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.

Building on the success of TRUST 2011 (held in Pittsburgh, USA) and TRUST 2010 held in Berlin, Germany) TRUST 2009 (held in Oxford, UK), this conference focuses on trusted and trustworthy computing, both from the technical and social perspectives. The conference itself has two main strands, one devoted to technical aspects and one devoted to the socio-economic aspects of trusted computing.

Important dates: Submission due: 22 February 2012, 23:59 UTC Notification: 25 March 2012 Camera ready: 09 April 2012 Conference: 13-15 June 2012

The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to:

Technical Strand:

Architecture and implementation technologies for trusted platforms and trustworthy infrastructures

Trust, Security and Privacy in embedded systems

Trust, Security and Privacy in social networks

Trusted mobile platforms and mobile phone security

Implementations of trusted computing (hardware and software)

Applications of trusted computing

Trustworthy infrastructures and services for cloud computing (including resilience)

Attestation and integrity verification

Cryptographic aspects of trusted and trustworthy computing

Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs)

Intrusion resilience in trusted computing

Virtualization for trusted platforms

Secure storage

Security policy and management of trusted computing

Access control for trusted platforms

Privacy aspects of trusted computing

Verification of trusted computing architectures

Usability and end-user interactions with trusted platforms

Limitations of trusted computing


Socio-economic Strand:

Usability and user perceptions of trustworthy systems and risks

Effects of trustworthy systems upon user, corporate, and governmental behavior

Economic drivers for trustworthy systems in corporate environment

The impact of trustworthy systems in enhancing trust in cloud-like infrastructures

The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight

The impact of trustworthy systems upon digital forensics, police investigations and court proceedings

Game theoretical approaches to modeling or designing trustworthy systems

Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space

Experimental economics studies of trustworthiness

The interplay between privacy, privacy enhancing technologies and trustworthy systems

Critiques of trustworthy systems

Facts about "TRUST 2012"
AcronymTRUST 2012 +
Camera ready dueApril 9, 2012 +
End dateJune 15, 2012 +
Event in seriesTRUST +
Event typeConference +
Has coordinates48° 12' 30", 16° 22' 21"Latitude: 48.208352777778
Longitude: 16.372505555556
+
Has location cityVienna +
Has location countryCategory:Austria +
Homepagehttp://www.trust.sba-research.org/ +
IsAEvent +
NotificationMarch 25, 2012 +
Paper deadlineFebruary 22, 2012 +
Start dateJune 13, 2012 +
Submission deadlineFebruary 22, 2012 +
Title5th International Conference on Trust and Trustworthy Computing +