[MEXT] TRUST 2012 - CfP
trust2012 <trust2012@sba-research.org> Thu, 01 December 2011 09:12 UTC
Return-Path: <prvs=33168DE642=trust2012@sba-research.org>
X-Original-To: mext@ietfa.amsl.com
Delivered-To: mext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44C9721F842C for <mext@ietfa.amsl.com>; Thu, 1 Dec 2011 01:12:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.098
X-Spam-Level: *
X-Spam-Status: No, score=1.098 tagged_above=-999 required=5 tests=[AWL=1.038, BAYES_05=-1.11, HELO_EQ_AT=0.424, HOST_EQ_AT=0.745, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xN7fWDgCExoa for <mext@ietfa.amsl.com>; Thu, 1 Dec 2011 01:12:17 -0800 (PST)
Received: from mail.securityresearch.at (mail.securityresearch.at [188.21.236.102]) by ietfa.amsl.com (Postfix) with ESMTP id B381421F844F for <mext@ietf.org>; Thu, 1 Dec 2011 01:12:15 -0800 (PST)
Received: from SATVIEEX02.securityresearch.local ([fe80::c5e7:fd42:5118:9799]) by SATVIEEX02.securityresearch.local ([fe80::c5e7:fd42:5118:9799%15]) with mapi id 14.01.0339.001; Thu, 1 Dec 2011 10:12:13 +0100
From: trust2012 <trust2012@sba-research.org>
To: "mext@ietf.org" <mext@ietf.org>
Thread-Topic: TRUST 2012 - CfP
Thread-Index: AcywCSBCLc+0MndDTV+nnxN7gqR1XAAABqVQAAADOCA=
Date: Thu, 01 Dec 2011 09:12:11 +0000
Message-ID: <600C904F06E46446BE46FBE4D5E010CD0862ADE4@SATVIEEX02.securityresearch.local>
Accept-Language: de-AT, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.16.1.150]
Content-Type: multipart/alternative; boundary="_000_600C904F06E46446BE46FBE4D5E010CD0862ADE4SATVIEEX02secur_"
MIME-Version: 1.0
Subject: [MEXT] TRUST 2012 - CfP
X-BeenThere: mext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Mobile IPv6 EXTensions WG <mext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mext>, <mailto:mext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mext>
List-Post: <mailto:mext@ietf.org>
List-Help: <mailto:mext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mext>, <mailto:mext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Dec 2011 09:12:19 -0000
Call for Paper TRUST 2012 13 - 15 June 2012 Vienna, Austria http://www.trust.sba-research.org TRUST 2012 is an international conference on the technical and soci-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems. Building on the success of TRUST 2011 (held in Pittsburgh, USA) and TRUST 2010 (held in Berlin, Germany) TRUST 2009 (held in Oxford, UK), this conference focuses on trusted and trustworthy computing, both from the technical and social perspectives. The conference itself has two main strands, one devoted to technical aspects and one devoted to the socio-economic aspects of trusted computing. Important dates: Submission due: 22 February 2012, 23:59 UTC Notification: 25 March 2012 Camera ready: 09 April 2012 Conference: 13-15 June 2012 The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to: Technical Strand: Architecture and implementation technologies for trusted platforms and trustworthy infrastructures Trust, Security and Privacy in embedded systems Trust, Security and Privacy in social networks Trusted mobile platforms and mobile phone security Implementations of trusted computing (hardware and software) Applications of trusted computing Trustworthy infrastructures and services for cloud computing (including resilience) Attestation and integrity verification Cryptographic aspects of trusted and trustworthy computing Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs) Intrusion resilience in trusted computing Virtualization for trusted platforms Secure storage Security policy and management of trusted computing Access control for trusted platforms Privacy aspects of trusted computing Verification of trusted computing architectures Usability and end-user interactions with trusted platforms Limitations of trusted computing Socio-economic Strand: Usability and user perceptions of trustworthy systems and risks Effects of trustworthy systems upon user, corporate, and governmental behavior Economic drivers for trustworthy systems in corporate environment The impact of trustworthy systems in enhancing trust in cloud-like infrastructures The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight The impact of trustworthy systems upon digital forensics, police investigations and court proceedings Game theoretical approaches to modeling or designing trustworthy systems Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space Experimental economics studies of trustworthiness The interplay between privacy, privacy enhancing technologies and trustworthy systems Critiques of trustworthy systems Best regards Yvonne Poul Organisation TRUST 2012
- [MEXT] TRUST 2012 - CfP trust2012