24 April 2015
8th International Conference on Trust & Trustworthy Computing
24-26 August, 2015 - Heraklion, Crete, Greece
TRUST 2015 is an international conference on the technical and socio-economic aspects of trustworthy infrastructures. It provides an excellent interdisciplinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using and understanding trustworthy computing systems.
Main website: https://www.ics.forth.gr/trust2015/
Short Link: https://bit.ly/trust2015
WikiCFP Link: https://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=45494
- Paper submissions due: 7 May 2015
- Acceptance notification: 10 June 2015
- Final paper due: 21 June 2015
- Conference: August 24-26 2015
Topics of Interest
TRUST 2015 solicits original papers on any aspect (technical, social or socio-economic) of the design, application and usage of trusted and trustworthy computing. Papers can address design, application and usage of trusted and trustworthy computing in a broad range of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols.
The conference includes a Technical and a Socioeconomic Strand. Following is a partial list of topics of interest for the two strands. For the full list of topics, please refer to the conference website.
Technical Strand topics of interest include:
- (NEW TOPIC) Applications and security analysis of trusted computing. Early explorations and results on new paradigms or emerging technologies (e.g. Intel SGX) are particularly encouraged.
- (NEW TOPIC) Trust, Security and Privacy in embedded systems and IoT systems.
- Trust, Security and Privacy in social networks.
- Trusted mobile platforms and mobile phone security.
- Trustworthy infrastructures and services for cloud computing (including resilience).
- Attestation and integrity verification.
- Cryptographic aspects of trusted and trustworthy computing.
- Security hardware with cryptographic and security functions, physically unclonable functions (PUFs).
- Intrusion resilience in trusted computing.
- Virtualization for trusted platforms.
- Security policy and management of trusted computing.
- Privacy aspects of trusted computing.
- Verification of trusted computing architectures.
- Usability and end-user interactions with trusted platforms.
- Limitations of trusted computing.
- Usability and user perceptions of trustworthy systems and risks.
Socioeconomic Strand topics of interest include:
- (NEW TOPIC) Trust in the Web: protocols and implementations of mechanisms to measure and leverage trust from the web (e.g., using social networks to establish trust for other services).
- The role of trust in human-computer interactions.
- Patterns of trust practices in human-computer interactions.
- Effects of trustworthy systems upon user, corporate, and governmental behavior.
- The impact of trustworthy systems in enhancing trust in cloud-like infrastructures.The adequacy of guarantees provided by trustworthy systems for systems critically dependent upon trust, such as elections and government oversight.
- The impact of trustworthy systems upon digital forensics, police investigations and court proceedings.
- Game theoretical modeling/design of trustworthy systems.
- Modeling and simulation of scenarios on how trustworthy systems would be used in corporate environments and in personal space.
- Economic drivers for trustworthy systems in corporate environments.
- Experimental economics studies of trustworthiness.
- The interplay between privacy, privacy enhancing technologies and trustworthy systems.
- Evaluation of research methods used in the research of trustworthy and trusted computing.
- Critiques of trustworthy systems.
- Metrics of trust.
- Privacy Aspects of Trust Computing.
- Engineering Processes for Trustworthy Computing.
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.
Format of paper submissions
Two formats of submissions are solicited:
- Full papers (up to 18 pages in LNCS format) that report on in-depth, mature research results.
- Short papers (up to 9 pages in LNCS format) that describe brief results or exciting work-in-progress.
To submit your work, visit: https://www.easychair.org/conferences/?conf=trust2015
All paper submissions to TRUST 2015 must be in LNCS format and written in English. The templates for LNCS format can be downloaded from the publisher website. All submissions must be within the page limits mentioned above. No changes to margins, spacing, or font sizes (or anything else) are allowed. The program committee reserves the right to request the source files for a submission to verify compliance with this requirement.
Moreover, all submissions must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not be overtly distinguishable from the referenced work of others.
Only PDF submissions will be accepted. For the latest submission instructions and dates, please refer to the conference website: https://www.ics.forth.gr/trust2015/
- General Chair: Ioannis Askoxylakis, FORTH, GR
- Program Chairs:
- Mauro Conti, University of Padua, IT
- Matthias Schunter, Intel, DE
For the full Program Committee, see: https://bit.ly/trust2015pc
TRUST 2015 Twitter Updates
18 August 2014
The Foundation for Research and Technology (FORTH) invites talented and motivated candidates with appropriate expertise to express their interest in the positions available in the project “Developing the foundations for modeling and analysis of spectrum markets” (CoRLAB), funded by a Research Excellence grant (GSRT/ΑΡΙΣΤΕΙΑ).
2 Positions of Postdoctoral Researcher
The work focuses on the analysis and assessment of wireless network markets and services. Topics include modeling the quality of experience of telecom services, analysis of incentives for adopting certain services/technologies, evaluation of partnerships between service providers and/or users, analysis of resource sharing mechanisms, assessment of the knowledge of quality of experience of a service on a market.
- B.Sc/B.S in Computer Science or in a related field
- Ph.D. in Computer Science or in a related field
- Completed military service (for male candidates)
- In-depth understanding of wireless networks and communications (e.g., in the design and analysis of network systems)
- Experience with EU projects (e.g., participation and proposal writing)
- Knowledge of network economics
- Good knowledge of programming
The successful postdoctoral candidate(s) will be offered a contract for one year.
Interested parties are invited to submit their application by August
Their application should include the following documents:
- Curriculum vitae (CV)
- Copy of their academic diplomas/certificates
- Letters of recommendation
- Certificates of work experience
The application should be sent via email to Ms. Chrysoula Iliaki
For more information about the position and the application, please email to firstname.lastname@example.org
More information about the technical aspects of CoRLAB can be found at:
More SysSec News
- 10/Jun/2014: PhD Studentship in Privacy-friendly Computation.
- 7/Mar/2014: Participation to the High Level Conference on the EU Cybersecurity Strategy.
- 7/Mar/2014: PhD Position in "Internet of Things and Big Data" at Chalmers.
- 21/Feb/2014: PhD Positions at Chalmers.
- 13/Feb/2014: Teaching position at Stevens Institute of Technology.
- 12/Feb/2014: Post-doc position on mobile platform security.
- 13/Jan/2014: PhD Position in Information Security at Chalmers University of Technology.
- 16/Dec/2013: Postdoctoral Researcher in Network Security at ETH Zurich.
- 18/Jul/2013: Academic Positions at Chalmers.
- 20/May/2013: Job Positions at Mondragon University.
News by month:
- April 2015
- August 2014
- June 2014
- March 2014
- February 2014
- January 2014
- December 2013
- July 2013
- May 2013
- January 2013
- November 2012
- October 2012
- September 2012
- July 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- September 2011
- August 2011
- July 2011