Main Nav

Message from trust2012@sba-research.org

Call for Paper TRUST 2012

TRUST 2012 is an international conference on the technical and soci-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.

Building on the success of TRUST 2011 (held in Pittsburgh, USA) and TRUST 2010 (held in Berlin, Germany) TRUST 2009 (held in Oxford, UK), this conference focuses on trusted and trustworthy computing, both from the technical and social perspectives. The conference itself has two main strands, one devoted to technical aspects and one devoted to the socio-economic aspects of trusted computing.

 

Important dates:

Submission due: 22 February 2012, 23:59 UTC

Notification: 25 March 2012

Camera ready: 09 April 2012

Conference: 13-15 June 2012

 

The conference solicits original papers on any aspect (technical or social and economic) of the design, application and usage of trusted and trustworthy computing, which concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest include, but are not limited to:

Technical Strand:

Architecture and implementation technologies for trusted platforms and trustworthy infrastructures

Trust, Security and Privacy in embedded systems

Trust, Security and Privacy in social networks

Trusted mobile platforms and mobile phone security

Implementations of trusted computing (hardware and software)

Applications of trusted computing

Trustworthy infrastructures and services for cloud computing (including resilience)

Attestation and integrity verification

Cryptographic aspects of trusted and trustworthy computing

Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functions, physically unclonable functions (PUFs)

Intrusion resilience in trusted computing

Virtualization for trusted platforms

Secure storage

Security policy and management of trusted computing

Access control for trusted platforms

Privacy aspects of trusted computing

Verification of trusted computing architectures

Usability and end-user interactions with trusted platforms

Limitations of trusted computing

Socio-economic Strand:

Usability and user perceptions of trustworthy systems and risks

Effects of trustworthy systems upon user, corporate, and governmental behavior

Economic drivers for trustworthy systems in corporate environment

The impact of trustworthy systems in enhancing trust in cloud-like infrastructures

The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight

The impact of trustworthy systems upon digital forensics, police investigations and court proceedings

Game theoretical approaches to modeling or designing trustworthy systems

Approaches to model and simulate scenarios of how trustworthy systems would be used in corporate environments and in personal space

Experimental economics studies of trustworthiness

The interplay between privacy, privacy enhancing technologies and trustworthy systems

Critiques of trustworthy systems

 

Best regards

Yvonne Poul

Organisation TRUST 2012

 

 

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.