SUBMISSION DEADLINE EXTENDED TO MAY 18
<br>
<br>In addition to papers/short papers, the TRUST 2015 also accepts 2p abstracts
<br>for poster submissions. The accepted abstracts will be included in the final
<br>proceedings. See: http://www.ics.forth.gr/trust2015/call-posters.html
<br>
<br>======================================================================
<br>Call for Papers: TRUST 2015
<br>8th International Conference on Trust & Trustworthy Computing
<br>24-26 August, 2015 - Heraklion, Crete, Greece
<br>======================================================================
<br>
<br>http://www.ics.forth.gr/trust2015/ / http://bit.ly/trust2015
<br>
<br>About TRUST
<br>----------------------------------------
<br>TRUST 2015 is an international conference on the technical and
<br>socio-economic aspects of trustworthy infrastructures. It provides
<br>an excellent interdisciplinary forum for researchers, practitioners,
<br>and decision makers to explore new ideas and...
Read more
SUBMISSION DEADLINE EXTENDED TO MAY 18
<br>
<br>In addition to papers/short papers, the TRUST 2015 also accepts 2p abstracts
<br>for poster submissions. The accepted abstracts will be included in the final
<br>proceedings. See: http://www.ics.forth.gr/trust2015/call-posters.html
<br>
<br>======================================================================
<br>Call for Papers: TRUST 2015
<br>8th International Conference on Trust & Trustworthy Computing
<br>24-26 August, 2015 - Heraklion, Crete, Greece
<br>======================================================================
<br>
<br>http://www.ics.forth.gr/trust2015/ / http://bit.ly/trust2015
<br>
<br>About TRUST
<br>----------------------------------------
<br>TRUST 2015 is an international conference on the technical and
<br>socio-economic aspects of trustworthy infrastructures. It provides
<br>an excellent interdisciplinary forum for researchers, practitioners,
<br>and decision makers to explore new ideas and discuss experiences in
<br>building, designing, using and understanding trustworthy computing
<br>systems.
<br>
<br>Important Dates
<br>----------------------------------------
<br> * Paper submissions due: 18 May 2015 (EXTENDED)
<br> * Acceptance notification: 17 June 2015
<br> * Final paper due: 28 June 2015
<br> * Conference: August 24-26 2015
<br>
<br>Topics of Interest
<br>----------------------------------------
<br>TRUST 2015 solicits original papers on any aspect (technical,
<br>social or socio-economic) of the design, application and usage
<br>of trusted and trustworthy computing. Papers can address design,
<br>application and usage of trusted and trustworthy computing in a
<br>broad range of concepts including, but not limited to, trustworthy
<br>infrastructures, cloud computing, services, hardware, software and
<br>protocols.
<br>
<br>The conference includes a Technical and a Socioeconomic Strand.
<br>Following is a partial list of topics of interest for the two
<br>strands. For the full list of topics, please refer to the
<br>conference website: http://www.ics.forth.gr/trust2015/
<br>
<br>Technical Strand topics of interest include:
<br> * (NEW TOPIC) Applications and security analysis of trusted
<br> computing. Early explorations and results on new paradigms
<br> or emerging technologies (e.g. Intel SGX) are particularly
<br> encouraged.
<br> * (NEW TOPIC) Trust, Security and Privacy in embedded systems
<br> and IoT systems.
<br> * Trust, Security and Privacy in social networks.
<br> * Trusted mobile platforms and mobile phone security.
<br> * Trustworthy infrastructures and services for cloud computing
<br> (including resilience).
<br> * Attestation and integrity verification.
<br> * Cryptographic aspects of trusted and trustworthy computing.
<br> * Security hardware with cryptographic and security functions,
<br> physically unclonable functions (PUFs).
<br> * Intrusion resilience in trusted computing.
<br> * Virtualization for trusted platforms.
<br> * Security policy and management of trusted computing.
<br> * Privacy aspects of trusted computing.
<br> * Verification of trusted computing architectures.
<br> * Usability and end-user interactions with trusted platforms.
<br> * Limitations of trusted computing.
<br> * Usability and user perceptions of trustworthy systems and risks.
<br>
<br>Socioeconomic Strand topics of interest include:
<br> * (NEW TOPIC) Trust in the Web: protocols and implementations of
<br> mechanisms to measure and leverage trust from the web (e.g.,
<br> using social networks to establish trust for other services).
<br> * The role of trust in human-computer interactions.
<br> * Patterns of trust practices in human-computer interactions.
<br> * Effects of trustworthy systems upon user, corporate,
<br> and governmental behavior.
<br> * The impact of trustworthy systems in enhancing trust in
<br> cloud-like infrastructures.
<br> * The adequacy of guarantees provided by trustworthy systems
<br> for systems critically dependent upon trust, such as elections
<br> and government oversight.
<br> * The impact of trustworthy systems upon digital forensics,
<br> police investigations and court proceedings.
<br> * Game theoretical modeling/design of trustworthy systems.
<br> * Modeling and simulation of scenarios on how trustworthy systems
<br> would be used in corporate environments and in personal space.
<br> * Economic drivers for trustworthy systems in corporate
<br> environments.
<br> * Experimental economics studies of trustworthiness.
<br> * The interplay between privacy, privacy enhancing technologies
<br> and trustworthy systems.
<br> * Evaluation of research methods used in the research of
<br> trustworthy and trusted computing.
<br> * Critiques of trustworthy systems.
<br> * Metrics of trust.
<br> * Privacy Aspects of Trust Computing.
<br> * Engineering Processes for Trustworthy Computing.
<br>
<br>Submitted papers must not substantially overlap papers that have
<br>been published or that are simultaneously submitted to a journal,
<br>conference or workshop. Simultaneous submission of the same work
<br>is not allowed. Authors of accepted papers must guarantee that their
<br>papers will be presented at the conference.
<br>
<br>Format of paper submissions
<br>----------------------------------------
<br>Two formats of submissions are solicited:
<br> * Full papers (up to 18 pages in LNCS format) that report
<br> on in-depth, mature research results.
<br> * Short papers (up to 9 pages in LNCS format) that describe
<br> brief results or exciting work-in-progress.
<br>
<br>To submit your work, visit: https://www.easychair.org/conferences/?conf=trust2015
<br>
<br>All paper submissions to TRUST 2015 must be in LNCS format and written
<br>in English. The templates for LNCS format can be downloaded from:
<br>http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0
<br>
<br>All submissions must be within the page limits mentioned above.
<br>No changes to margins, spacing, or font sizes (or anything else)
<br>are allowed. The program committee reserves the right to request
<br>the source files for a submission to verify compliance with this
<br>requirement.
<br>
<br>Moreover, all submissions must be anonymized. An author's name should
<br>occur only in references to that author's related work, which should
<br>be referenced in the third person and not be overtly distinguishable
<br>from the referenced work of others.
<br>
<br>Only PDF submissions will be accepted. For the latest submission
<br>instructions and dates, please refer to the conference website:
<br>http://www.ics.forth.gr/trust2015/
<br>
<br>Organisation Committee
<br>----------------------------------------
<br> * General Chair: Ioannis Askoxylakis, FORTH, GR
<br> * Program Chairs:
<br> - Mauro Conti, University of Padua, IT
<br> - Matthias Schunter, Intel, DE
<br>
<br>For the full Program Committee, see: http://bit.ly/trust2015pc
<br>
<br>TRUST 2015 Twitter Updates
<br>----------------------------------------
<br>Announcements regarding TRUST 2015 will be sent through @syssecproject
<br>on Twitter: https://twitter.com/syssecproject
<br>
<br>