首页
社区
课程
招聘
[分享] [ias-opportunities] Second CFP: 3rd International Conference
发表于: 2009-12-23 22:58 5358

[分享] [ias-opportunities] Second CFP: 3rd International Conference

2009-12-23 22:58
5358
[ias-opportunities] Second CFP: 3rd International Conference on
Trust and Trustworthy Computing (Trust 2010) - Deadline Extended

From: owner-ias-opportunities@cerias.purdue.edu
[mailto:owner-ias-opportunities@cerias.purdue.edu] On Behalf Of Marcel
Winandy
Sent: 22 December 2009 10:54
To: ias-opportunities@cerias.purdue.edu
Subject: [ias-opportunities] Second CFP: 3rd International Conference on
Trust and Trustworthy Computing (Trust 2010) - Deadline Extended

************************************************************************
**
                           Call for Papers

                             Trust 2010
     3rd International Conference on Trust and Trustworthy Computing

                   June 21-23, 2010, Berlin, Germany
                       http://www.trust2010.org

************************************************************************
**
     Submission due:     9 February 2010 (Extended Deadline)
************************************************************************
**

Building on the success of Trust 2009 (held at Oxford, UK) and Trust
2008
(Villach, Austria), this conference focuses on trusted and trustworthy
computing, both from the technical and social perspectives. The
conference
itself will have two main strands, one devoted to technical aspects and
one devoted to the socio-economic aspects of trusted computing.

The conference solicits original papers on any aspect (technical or
social
and economic) of the design, application and usage of trusted and
trustworthy computing, which concerns a broad range of concepts
including
trustworthy infrastructures, services, hardware, software and protocols.
Topics of interest include, but are not limited to:

Technical Strand:
-----------------
     * Architecture and implementation technologies for trusted
platforms
       and trustworthy infrastructures
     * Mobile trusted computing
     * Implementations of trusted computing (covering both hardware and
       software)
     * Applications of trusted computing
     * Trustworthy infrastructures and services for cloud computing
     * Attestation and possible variants (e.g., property-based
       attestation, runtime attestation)
     * Cryptographic aspects of trusted computing
     * Security hardware, i.e., hardware with cryptographic and
       security functions, physically unclonable functions (PUFs)
     * Establishing trust in embedded systems (e.g., sensor networks)
     * Hardware Trojans (detection, prevention)
     * Intrusion resilience in trusted computing
     * Virtualisation for trusted platforms
     * Security policy and management of trusted computing
     * Access control for trusted platforms
     * Privacy aspects of trusted computing
     * Verification of trusted computing architectures
     * End-user interactions with trusted platforms
     * Limitations of trusted computing

Socio-economic Strand:
----------------------
    * Usability and user perceptions of trustworthy systems and risks
    * Effects of trustworthy systems upon user, corporate, and
      governmental behavior
    * The adequacy of guarantees provided by trustworthy systems for
      systems critically dependent upon trust, such as elections and
      government oversight
    * The impact of trustworthy systems upon digital forensics, police
      investigations and court proceedings
    * Economic drivers for trustworthy systems
    * Group and organizational behavior within trustworthy systems
    * The impact of trustworthy systems upon user autonomy, social
      capital, and power relationships
    * Cross-cultural definitions of trustworthiness
    * Can systems be truly "trustworthy" without any capacity for moral
      reasoning?
    * Trustworthy systems and precursors of trust such as honesty,
      benevolence, value similarity, or competence
    * Trustworthiness, regret and forgiveness
    * Trustworthy systems as enhancements or constraints on government
      power
    * The role of independence from vested interests as a driver of
trust
    * Game theoretical approaches to modeling or designing trustworthy
      systems
    * Experimental economics studies of trustworthiness
    * The interplay between privacy, privacy enhancing technologies and
      trustworthiness
    * Regulatory vs peer-produced trustworthiness, including reputation
      systems
    * Global governance initiatives to manage trust
    * Critiques of trustworthy systems

General Chair:
        Ahmad-Reza Sadeghi, University of Bochum, Germany

Program Chair (Technical Strand)
        Sean Smith, Dartmouth College, USA

Program Chair (Socio-economic Strand)
        Alessandro Acquisti, Carnegie Mellon University, USA

Program Committee (Technical Strand)
        N. Asokan, Nokia Research Center, Finland
        Sergey Bratus, Dartmouth College, USA
        Liqun Chen, HP Laboratories, UK
        Cynthia Irvine, Naval Postgraduate School, USA
        Bernhard Kauer, Technische Universtat Dresden, Germany
        Michael LeMay, University of Illinois Urbana-Champaign, USA
        Michael Locasto, George Mason University, USA
        Andrew Martin, University of Oxford, UK
        Jon McCune, Carnegie Mellon University, USA
        Chris Mitchell, Royal Holloway University, UK
        David Naccache, ENS, France
        Dimitris Pendarakis, IBM Watson, USA
        Graeme Proudler, HP Laboratories, UK
        Anand Rajan, Intel, USA
        Scott Rotondo, Sun, USA
        Ahmad-Reza Sadeghi, University of Bochum, Germany
        Radu Sion, Stony Brook University, USA
        Christian Stueble, Sirrix, Germany
        G. Edward Suh, Cornell University, USA
        Leendert van Doorn, AMD, USA
        Claire Vishik, Intel, UK

Program Committee (Socio-economic Strand)
        Andrew A. Adams, Reading University, UK
        Ian Brown, University of Oxford, UK
        Johann Cas, Austrian Academy of Science
        Lorrie Faith Cranor, Carnegie-Mellon University, USA
        Tamara Dinev, Florida Atlantic University, USA
        Peter Gutmann, University of Auckland, New Zealand
        Tristan Henderson, St Andrews University, UK
        Adam Joinson, Bath University, UK
        Eleni Kosta, Katholieke Universiteit Leuven, Belgium
        Meryem Marzouki, French National Scientific Research Center
(CNRS)
        Tyler Moore, Harvard University, USA
        Deirdre Mulligan, UC Berkely, USA
        Anne-Marie Oostveen, Oxford University, UK
        Andrew Patrick, Carleton University, Canada
        Angela Sasse, University College London, UK
        Jonathan Zittrain, Harvard University, USA

Important Dates:
     Submission due:     9 February 2010 (Extended Deadline)
     Notification:       10 March 2010
     Camera ready:       24 March 2010
     Conference:         21-23 June 2010

Paper Submission:
        http://www.trust2010.org/submission.html

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//